You are on page 1of 56
Be vont t Wr Tommi So and Ness How many oupt bit are produced when 3256: dig words appli te conoltional i wath 30 [hese the base proces invoked nthe block nerevingof data its bef vansmision. (thatthe base atvarage that dtl modultion oe? Deserbe PSK madaton ‘esrb an OFDM modulation stem fan OFDM sytem tars 32 kbps over each car ahd uses 16 caries, wha the overall day ‘esse 5S operon. ibe DSSS operation 2a Ogre cleswidcbnd technol {type of odo pulses re wad by UWE? ‘ei the tai theory behind th ws of vey ina wireless sem, ‘ese the base theory behind the oparson of RAKE rece, ese the aval implementtion of pce dive ors wiles stem, 2. Pee hon polrtaaon divest pemented for aces icles st. Desrbe the opeation of n RE combing ut Wireless LANs/IEEE 802.11x 2 tons aims anein sO aa ssa? 3 ese enone cll dpe Row sratnance aly performed oa modern cellar aio base tation? 2 puisoMt sofware! ctv a completion of hich, the ude coud be abl 3 pat timing standard does the typical CDMA system use? +. Discus the basic differences between wiles LANS and wireless mobile systems 2H pw is CDMA sjtem timing achieved? 4 Discuss the evolution of the IEEE 802.11 stancard and its extensions IEEE 802.11x. 5 darn CDNA rao be ston cn agp 0 wat carr Sul ow muh power in e+ Deus ere ene bw ed an ies ANS 36 acchamel How mach power inthe yc channl? {inte bi acer EE 02.1 ves Uns is the ERP for a CDMA radio base station that can output 10 watts and has 2 17-d8 antefng’ J * Discuss the services the wiles suber. a. ate 3 tpt 10 wate adh 17-4 neg Pt Dis esis ered bythe wiess NMAC te the man machine interac of aclu wireless mobile ado 4+ opin the bss deta of WLAN 88 and DSS physical ayer. = arte abtie famabie phon maiotseed fie aan ofthe newest mode + Discuss the adoption ofthe higher-tateIELE 802. 11s standards and the technical details of IEEE * 02 11g 4 Discuss the present status of wiress LAN secuty 3s embod by IEEE 802.1, 4 Discuss the status of competing wireles LAN technologies. 4 Discuss ypcal wires LAN hardware and jem deployment strates. 3 otismeant bya multimode mebie phone? This chapter is the Fest of several chapters that teedacesanoher lass of wireless network technologies, ‘Uni hs time he focus ofthis text ha ben on wieless mobile networks that provide mobile subscribers wih voice and data service va connections tothe PSTN and the PDN. In aio, tes wireless networks so rove the mobil ser with ear searlessrmbility ona mationa and soon-to-be-lobl sal. Sang ‘ith his chapter, anton shfs to the IEEE standardized speciiatios fr wireless LANs, PANS, and [MAN6. These standards frm the basis forthe inplementation of high-performance wireless computer ne- ots that ace usd in avait of diferent operating spaces (ie, short, medium, and long range) with a ‘ide ange of data throught speeds. Ths chapter will discuss basie wireless LAN iIBEE 802.11) technology Beginning with a shot inteo- ‘ton tothe history of wireless LANs (WLAN), the reader wil be quickly ought up to speed onthe [sci sate of the standards andthe cocespondingtechalogy’ implementations. Wireless LAN architec ‘wl structure will be discussed inthe comext ofthe services provided bythe WLAN, Detis of Layer 2 MAC operations wll be prseated before the deals ofthe physical ayer are discussed. Once the details of operation of teil standard have been introduced, focus sis othe extensions to the standard that [ave since been adopted. Detail ofthe pysical layers of IEEE 802.1 Tha ate presenved with emphasis fon he changes and modieations needed to ilement higher dst rancor speeds and new complex J Moduation schemes. Next, dels ofthe newly sdopted 802.11 standard that ads an advanced secrity VW — andard juced, The cha ith & short dis about othe "ire AWARE a8 tcl the 021 art int The chap ns wis hon cession aot te com, " Fn es LA gayi et aye WLAN ee mn Me et ese en im ont te ec "agape Roce enn ee and pe ad ince hip anlenliy a pnd ee ee te othe delgment ols karate with Which oe can pect a mane Ne 9.1 INTRODUCTION TO IEEE 802.11 TECHNOLOGIES one foe, th maj hp maneacies have aleay spc low com WE cats GaN ‘The IEE 807.1 standards frm he basi fr he inplemecation of high-performance wiles compu | HAR shy sion paren The ast mjc ofthe isd LANS inthe Wards eto inte cas based one IEE. FAB of he Sane Mohn ‘802 standard (ethernet is based on 802.3 and token ig is based on 802°), The IEEE 8021 Ix stay fersnf Xbow) have nelaiea dats define the over ahe sit protocols necessary to suppt networking Ina LAN environment In esac, the wiess LAN stndards were writen to provide a wieess extension to the enising wited sandal Furthermore, the WLAN standards would te developed withthe following goals seamless roaming, mes. Sage forwarding, the greatest range of operation, and rapport fora large numberof wsers, The IEEE Snlzed the in star fc wireless LANS (80211) in Jane of 1997 5 ‘This intial standard specified an operating frequency of 24 Giz (an ISM band) with data rts oft and 2 mbps and te us of ether of two spread spectrum modulation techniques, FHSS or DSSS. Additional, ese a asd of ard) ite ye pet eon St release of the initia peitiation, te TEEE 802.11x working groups have conned to mee and eft he teil. The est ths fos ave lea cance an xen te eid sei ‘Beginnings—ALOHA-Net eter asic mess aes sate frac of ecraton. an tenet das 971, stock ane thos wee bugger thine dg einen sacra tr rm ae saves ecary concerns, quay of service (Qo) abt] at a esc projet cal ALOHA Ne te Cane af ha ae system alowed interoperability betwee diferent vendor acces points (APS). ‘sompules a sven campuses spread cut ovr four islands Io comncnicate with acetel compute en Inte last several yeas, the pte rate and deployment of WLANs has proven to be an unqualified sue ‘xetg with song enbracenen of ths ecology b sever diferent sectors ofthe economy. Many] (NIC) or RU-AS jack tothe LAN. Ina WLAN, the adesable unt is known a a lation (STA). The wie- lesly enabled station serves as a msage destination bt in geerl doesnot indicate a fixed location. A Winds LANABEE 800115 289 288 redaction to Winds Temitins Sp and Needs ‘Within the IBSS situ, iis important wo note that the association between an STA and a BSS is a jnamic relationship. Aa STA may be ted on o aff ot come into or 0 out of range ofthe BSS un ted numberof imes. The STA becomes a member ofthe BSS stture when it becomes associated ith the BSS. The association process is dynamic an willbe discussed at some leith shorty, tribution System Concepts 5. For any wireless LAN the maximum staton-1o-staton distance that may be support js determined by many factors ncuding RF output power ante propagation condtons ofthe local envroament Tope Pride for an extended wieles network consisting of mulile BSSS, the stands allows fran athtecal omponent known as te dstibution sysiem (DS) to provie this uneinaliy. To provi exbity tthe architecture, IEEE 80.11 logically separates the wzeles medivm (WM) ffom te dstibation sj tem mediom (DSM), Figure 8-3 shows a diagram ofa distribution sysem and several access pos Sevng BSSs. fue difereniatr of wireless versus wired LANS ie inthe fndametal ference in the modes fs tal propagation encountered inthe two systems: Wired (point-to-point) connections yield highly redicuble and reliable wansmisson of signals wheres wieks radio inks ate highly unreliable, They facts sie there ace same jut a important but suble efecto be considered when designing awit LAN, such as: 2 wireless LAN can hve stivly changing topologies, WLAN radio link signals are at “prowected fom outside EM terrence, WLAN radio inks experience time varying mulipah effect and therfore the useable rage of the system varies, WLANs have nether absolute nor observable bound, andthe port existe thatthe WLAN lack fall conectivithat where every aon can hee vey oer station. This ls onsequence of the use of wireless is Sometimes refered io the hidden stacy effect Two final factors to consider are tha IEEE 80211 is required wo handle both mobile and pote stations and deal wit tater powered equipment. Mobile sation by definition ae actually in motion aad moving about the WLAN whoreas porable stations may be moved about to dffeeatoeations within te WLAN but ae only use while ata fied lation. The fact thats station maybe batery powered give ie to power management schemes that might equi & WLAN sation to go into the sleep mode. I this i as, this also must be considered inthe design ofthe sytem. The next fw sections will adress the com onents and the basic tpologies (known a service ses) suppor bythe IEEE 80211 architect. The soled service ses provide WLAN functionality that seppots station mobility that i transparet iger-rotca yer. Independent Basic Service Set Networks ‘The base service se (98S) sth simplest and most fundamentl strate ofan IEEE 80211x WLAN, See Figure 9-2 fra diesem ofan independent BSS (IBSS). Thee is no backbone infasrctre sd te network coasts of at last two (here can be more) wireless stations. As mentioned before ths struct sometimes refered 0 a peeto-peer or ad hoe wireless network. As the figue shows, «propa boundary will exist bos exact extent and shape are subject to many variables. As discussed in Chapt ‘simulation software exits ht can provide seme resonable estimates of RSS for typical mulifloor ach tectural layouts and varous building mateals. However, the colorized signal-stength contours provide! by thee sofware tools ire only as good asthe mols used to ereate them, A the presente, the evo ‘ion ofthe predicted vais to he actual values ean be quite substaal Ii also posible to have two or moe ofthese IBSSs inexstnce and operaonal within the same general area bu notin comymunieatios with one anther. open sea oa mp onan gue 9.3 A pal dientuon sem nd vet aces poise ‘The funtion ofthe DS is wo enable motile device support It dae this by providing the logical seevies meesary to perform adress-o destination napping and the seamless integration of mulple BSS This lst funtion is physically performed by a device known san acces pint (AP) The AP provides ac othe DS by providing DS services anda the sae time perfrming the STA function within the BSS. In Figure 9-3, data transfers cur between stations within a BSS an the DS via an AP. One should noe ta sl the APs are also stations ands such ave adresses, However, the aes used by an AP for data cam ications onthe WM side and the oe wed on the DSM sie ate not ncessaiyone andthe same. This Seto stuctre gives ts othe us of APs a bridges o extend the reach of network. Fgure9-2 Apical indpendont eet. 290 din Wis Tommasi Syed Nes snc ‘Extended Service Set Networks ow ‘i epeting von he desired WLAN coverage ae, te wi BSS network may my aaa thi once may he weed Taove, te TBE 91 andr rove {Gedo mie Bsr and DS wo cee a wes actor of abi siz and comple Tse tiv sv tnwnasextd sevice et (ES) ews SS works poi alms ey pee arto be the same as an {BBS network to an upper layer logical link control (LLC) Lavernnned hi itn an SS ew yen wiht ae td eb i ty mortar ome Stout one ey al pet ean ESS nek. Fe ‘en ogh ee of an SS mata fe lowing ae may DSS yop ide continuous 2overage areas or BSSs can be physically separate entities, BSSs may be physically ‘Sftctdoreand esony nee or mot ADS or SS twos a Be psa leat {te tame aren Tat ston con commonly Ochre scparaeerganieatios St up thi om "WLAN ince proiniy one ter 94. IEEE 802.11 SERVICES—LAYER 2: OVERVIEW ‘Te IEEE 802.2 snr pecs the log ink contr (aye 2) servis tat wove thet wor lye Proto th OSIiode be LLCs the highs aye he ik Ine ce Rug Tee MAC ur of Lays 2) ad ysl ye (Layer ofthe EEE 2 snd ae creeds | fb standards spar from the LLC sce re aight coupling been the median sees sons Wes acossa LAN sing an IEEE 8C2-bied MAC coal ink. LLC ptool data nis PUD tanded down thous the MAC sevice acess point (SAP) tothe MAC sobaex, The LLC PDU i coe f juled with contol infomation atthe start and end ofthe packet, forming the MAC frame, The Me Integration of Wied and Wireless LANs eas fer ee ‘not wise mem ae con! (MA) wv nn MSL a coer ws LAN ese oat arr ero Ce te oes ecaitaca crane eae ecerenatec ppoaatsttantrmnar ner ioe eee 122, ‘ig Ek Cont) jveeé mas | tas wos | weewnas | wee amex eee eo t Fe Frwe 9-5. Rencnhipo SE 612.x eau othe OS yes (Core TEE, [The IEEE $02.11 architecture purposely does not speciy deals ofthe DS implementation. This was done to provide high level of fexiblity i the posibeimplemeations ofthis prion of the haw Tested, the standard specifies architectural services. The seve ate intr aseited wih partons amponents ofthe wireless LAN srs. These sevics ae casified as eter sation seve 89) ce «sitibation system services (DSS). In each cs, te services provide the fonctions that the lei ak ntl (LLC) layer requis for sending MSDUs betwee wo devices onthe newer The satiog serine roid the neesary fonconaliy forthe network operations of stent deaubenizaon, prac ‘nd MSDU delivery. The asorned dtibuion sevice operations at eves typical provi ty + tess pin sacha association, iasaiton,dstbuton,nteraton, and essen Atti pooh 's hoped tat the reader has some vague (or beter yet, informed cas tothe meaning of sine thon, eos fom te coverage provided about wirless mobile systems bythe fist seven capers of ths beak ‘here are many analogies one may draw between the operations of the two systems. However, nt ala ‘ese terms are realy recognizable so explanations wil be provided shor In aay ese, each aol LAN service i specie for use by MAC slayer ete, Se Figute 9-6 for a depiction othe ga nhieu ofthe 802.11 staan. init Ste (5) vhan9-4 Awudestad\eih eve doo weed LAN. 96 Logi architect of th IEE 802.1 standard (Couey of EEE. te ites LAN wt conection 120 292 ned o Wires Terman Spe and Networks ‘One more aspect of IEEE 802.11 acter hat shouldbe noted is that fret portions of the net wok (ie, WM, DSM, and ced LAN) ae allowed to opeat with different ads spaces. The stander fas designated the IEEE 802 48-bit (MAC) adress space for dhe Wh and there're it is compatible with ved LAN addressing. For aay cases, de possibility exists that the the local addess Spaces usd Grin pseu mal be these However, this snot aay the ease as hesitation when the DS Implementation ses network layer addetsig to provide enhanced mobility funcons sete earsin as ts Seaver seater ee Sasa _——ae Bee BSS, the reassociation process will provide the DS with a correct wp-to-da ing oe Soe Reacts er a pata ben cyst cn ee icin ntainy amass te in ere ne ne that becomes necessary, fone ‘Acces and Seoty Contol Senices BE As exons pei, tinh difrencesbesn wieand ‘uote geo te srl aol ss FF the coral eae of ved LAN. Attra psc eco ea wiles LAN wi chases tt mii tis fs wid LAN Winks LAN Sean vi te atta evi, This weve edt alow al ws sans tr ce ‘with all the other stations that they will potentially communicate with. If mutual agreed Tevet ot authentication cannot be established between two stations, then an association will. lsd The EEE $02.11 standard suppor ievealautenteaton process nding oes nyse oe ot ses te stein provid betwcen stato na nk ve oan sere ee station be authenticated wth manycther sation at any given ine. Acomplementry ices dene 0-00 can ony be asc wi al Whe is powered op. nao tablish an association by invoking on cto spp te cn nana Overview of Services—Distribution TEE 607.1 specs rine difeent service Sx ofthe ine awed suppor MSDU delivery between WLAN stone, The ther tee services ar ued 1 contol WLAN acces and provide cofdenay. Enc of the various serie ir suppor by oe ot more MAC frame types. The MAC soblaer uses hse ‘pps of messages contol, dat and manage The enol meses supper delivery ofboth a nf management messages. The daa and managemet messages ae wed 0 mppr he saves. Te dei of ths wil be disused i an upcoming Secon. Athi ine, the fling section wl escrito tow the parla serie sed, ow luz tar eves, and is lao the oecal nee tov whic I shoul be pointed ou ft within an ESS ntwek al serve are aad, weer, Win en BSS ony staon series are available. While going though he owing mater, the reader Shaler back o gure ota necessary "The csrbion serie ithe mst comnunly uscd srvie by a WLAN stain. Every tie ta es sage sent ee or fora station that part ofan ESS network this services invoke. Consider he taser of ita message om a soninone BSS Wastin in goer BSS nr both BSSs a put of n ESS network The mse frm the eigiating satin is ans the stow AP that coon tote DS. The AP ands of the message he DS. The DS diver the mesg: othe APsaton ot desinaton BSS an he da message Sly wanted 0 he desnaton stn, A Yavaton on his ttre operons wen he destination ston eds nthe sme BSS athe wigan ston. In is Caste inpt an ouput AP sat fore mesage wold be thse. ison consetenethat he ee reser as eal Sta cml nob ces ies hess: sn. Whee an eigenen eee i ee a tein sere ws invoked by the operate, Se ae nak “Te npn sevite invoked wher the mete tot delve is iene for an ERE a2 PE ton. Again. destin oieaion ota oqetan no teceatoy fee LAN: AS expat previo, his opran wuld involve the ic of poral at conc i DS othe ft TEEE 80.1 incldes the ability provide basi encryption the soem of mesapes Te shes [EEE 812 LAN. The integration fonction woud pefom the steps neces (aes ensations, et) © deliver the message, In my aes, where te DS sa wied LAN, the AP woud provide hs unctnaiy ‘The following cscassion involves the series tt suppor the tbat snc. Since te primary “Gee MEOTm brown as wired equvaeat privacy (WEP). WEP may Seinvekel le dos he ee pupose of « MAC sublayer iso tant MSDUs between MAC sblayer enti here ar cea asccr 4 el operations tht must fint be prformolt provi the core comet for fe data message enter (Gc ston ot ft be aso with the arwoek Before the dtriton service can be invoked) Bele preceding father, detinitns of WLAN station mobili wll be se feth. The is cas isthe seas, ther i tnston by the wiles ston o another ate of comecon: however, the aon ty physealy move abou th BSS. The econ eae, BSS warston, i when WLAN sation moves tetvcen BSS ofthe sae ESS network. The hid ee ivoles he movement athe WLAN sain fo one BSS in a parialr ESS 0 4 BSS in rather ESS, The ssecaton series ppt lesa pc af oii itless LANS (physically close vere lat atept to bring the wireless LAN F2 WLAN inthe Emre eneanae oe Schoo ‘@\ ton of this chapter. sesh tow WLAN _! Relationships between Serices Wenn og oie ia te - fen rane en oe ee of me Ac cn sto Fie Tari ee re ag i eerie Bec ima arc og tennant mec etn etre ear ar ation); and Class 3 includes all te types of frames including unesticted data frames If incorrect or city will be preseated in ner see- Association, Reassociation, and Disassoviation 3 Foca wireless LAN tobe able wo deliver a message aero DS, the DS pends to Ino which AP to deliver the message to in order to reach a patculie station. This information is provided to te DS thovgh te scacaion operation. Before a station i allowed to senda message va an AP. it must fist become asc sted with the paicular AP. The process of tecoming associate with an AP invokes the association servi 204 dation o Winds Tbs Ss ad Netaorle met (asf 2ana3 Figure 9-7 Relationship feween sending an recving stains (Couey of TEE) analowed clases of fares ar seat and received, deauthentcation or disassosiaton ames (as appropiate) wll be sent bck to the sending station ach oe of the services introduced previously inthis section is supported by one or more IEEE 802.11 messages. To give tbe reader a fel fr the general makeup of the message and type of information con- tained inthe messages, several examples of iferemt message types will egven er. Example 9-1 Fora wireless station to end ditto another wireless sation i sends data mestage ofthe following form: Service Type: Data Mestage Message Type: Data Message sbype: Data ~ Information tem: 1 IEEE source address ofmessage * IEEE destination adres of message = 4510 Direction of message: From STA to STA sample 9-2 Fora station to astoiats the asociaton service causes the following messages to occur Association Request Message ype: Management — Message subtype: Association request = Information items: ‘IEEE addres ofthe STA inating the request 1 TEBE addres ofthe AP wth which he initaig station wil axsocne = ESsiD — Direction of message: From STA to AP Assocation Response Message type: Management — Message subtype: Associaton response Information tom: 1 Results ofthe requested association ther success or insucesfd 1 For a success assoclation, the response wll include the asocation dee, \ AID P —Direton ofthe message: From AP to STA a Ie messages for eassoiation, disassociation, privacy, authentication, and deathentcaton ae all sinlar fii tbe examples shown, Not that for an IBSS there is by dtniton only ne BSS, an teelore sce ris no DS there can be no DS services. In this ce, oly Class 1 and Clase 2 fiance can be eet te ier should tflect upon the similarities and ferences of witless LAN network statment inal Jon procedures and those ofthe wieles mobile networks previously discussed, PS ‘95 TEEE 802.11 MAC LAYER OPERATIONS ch station and abcess point onan 802.1 network: implements the MAC sublyer servie, The MAC sub- ly provies these primary wireless network operations to witeles stations accessing the wears ‘afm, joining a network, and authentication and privacy. Once these operations have been sucess tefemed, the devices onthe network may communist dough the transmission of MAC tance, There ‘ste ypes of MAC frames: conto, management, and deta, Contl frames ae Wed fo wee he (every of dat frames, Management frames ae used to establish inal communications between stations tat acces pons. Data fames cry information. Adon, the MAC sublayer provides for sever! Seat pes of MAC services. The primary MAC services ar asynchronous dla save, su svie, ‘2d MSDU ordering service. The next several sections will provide a discussion of MAC services, the HOCIMAC layer sevice primitives, MAC frames, and techniques used in accessing adjoining wilens ‘ewok in grester depth. EEE 802.11 standard all wireless stations suppoe asynchronous dita sevice. This asynchronous port of MSDUs is perfomed on a “best-ffot” conretoaless basis (., no guarnters of sevssfl every) using unicast, mohicat, and broadas anspor. This MAC service provides pot LLC ik withthe abit o exchange MSDUS. This acts sccomplihed trough te lal MAC (ending) ‘ng the physical ayer to anspor MSDU ta peer MAC (receiving) entity at which po it's —_—_— 296 tarde o Wes Tlesmmaniatios Ses and Nets Wires LAN ME e016 Seine we pe LLC ty. Thro castor sie win oycnms ua vee ad dea ih he elect fering he eine AC ane om vin These eet neste nfo MSU sl et he sf eran tome 2 6 se 6g ana aa ei ier is ec ye per MA ey fot a , 2 See sed cite Pov EE 8011 ar ove by th beatation eve at be WEF contin ‘Bes Tesi [Atte | ates [antes] Sep | ation | ne eee runt serves offered a ited ote exchange of data betwee son The Po) 1 Conca | | ay mean, The ey ef MSDU. WEP nen! opal servo wih wichae 3058 —— SS i A eon np oe LL rir yes Ae. Gig abour is tpt inthe chat smn Famer TE ae prided bythe MAC sblayerpemit ther StretyOrdeed or ReordersleMlisas 2@vey 2 ‘ A : " — ices ote agement oes may rue ie ordering of MSDU bl tale wes ve vas RC pet ey cent, oe Stvoaeagigg LOH | PSI | | | OE Fee | neem | ve ana 8 ce ed power mange ate eatin st a tea LLCMAC Layer Service Primitives gure 9-8, Examples o IEEE 802.1 MAC ete oes (Corey IEE) aoc ventacine rieqinivaoorcontaniainawen eileen Thx MiG) 2 TDeLLOMACIne ri Fe ccna at espe. Tu fe Ey - noe tren be ln armen aE on fale top rt ime ry ee eee ong re [se [i [eee [i [| oor] yan ndestion ive a eT rer — | vrcve a eapene primi complet nation tat as inl erdard, the LLC layer communicates with is asoited MAC by service pimitives: Y MA-UNITDATA seqest “This pi s aoa ett single psx LLC suloer entity oa roupof er eis tro he a ee pine st te aited MAC oer ny at nae gl AERC ane an then pas ton he py ne eae a peer MAC ong err eas casey be, Theda ane ay be an infmaon fame tat com cate ot rae atte Leal LLCs communiatng othe poet LLC. Fen eTYDATA indienton This primitive is sed by the MAC soblayer ent 10 define ae erre tinne (MSDU) from the MAC sublyer tothe pet LUC slayer esy or ets Tas operation ely oecur if the MSDU bas been recived without 0 Gfemployed, andthe destination adress Fue 9-9 stows ese [Fore soe nef be fn cl eet yf i MA a) = etn line bir ee = iso be mens nd picasa eso ven oe TEEN san we wil mp nol fc sown de sce eer ane su eee nh St prt a =/aSn mce epea see e a ante see nec ai ne acne ce pep ernie mrp panne ae case of group adress. vat formated frame, bas valid WEP encryption tates the correct MAC adress ofthe station. « MICUNITDATASTATUS indication This printve has onl local significance. Its pase MAM ote ety tthe LLC slayer ety and wed 1 inate sets nfornaton to Ae oni forthe conespoding preceding MA-UNITDATA. request primi prin AP Aste WLAN Te com so tees elena clr saan 2s Teel pvr sunnah MSDU oe MAC Basic Frame Structures provides a MSDU fragment number, if needed. The frame body i isa minimum length of 0 bytes “The IEEE 602.11 standard specifies te fomat ofthe MAC frames. Any eament tha is compa aa ied aie to propel construct frames fr tansmisson and decode frames upon reception sa ean cost of the following basi componeats a MAC header, a variable length fame 9, eae rapes sequene (FS). The MAC header consis of ever Fes inching frame come, aoe ee ec uoqsnce onto information. The ame bay contins information tats se troops te FCS contains an IEEE 32-8 lie redundancy code (CRC). igre 98 stows a rere MAC frame format and a management MAC frame example. Ths feds Ibe M3 seqeenee contol addres 4, nd fame body ae nly present in cern pes of ames aie iad ame eld thre typically exit subfields that are wed to provide atonal informates ne Bpes int nn eu ira pe MAC aT i ons a of frame type. To provide some continuity to this topic 2 foe seveo SAC exanpc lb gen bre ors cor of MAC fas tthe ex wil sw com te EEE 1 saa deta. Typieal contol fam eae rogues o send ler to send, acknowiedgement Feu 9-10 stows the format of he ane onl foraconl fe 1 an Powersave 298. forte Mina Tasmanian Sa ant Ntwerke Wines Lavoe: 2 16 299 j 2 + ag wos wet [om | om fe]olelelasle lee B ve _ 1 Mat : ee —— : : } ewe 010 Fontenelle Cao HE i reat ——— 4 i a tom | ; ter |aem| we De De | Got Il set o . WC ted 16 —— Ase ‘eg Fei 55002115 ane nro beri bbe Inthe igre, the RA ofthe RTS frame i the adres ofthe sation onthe WM that she intended destin. 4 Tine tion of the pending das or management frre. The TA is the ares ofthe sending sation athe duration ‘ale isthe time in microseconds that wil be required 0 transmit the pending frame, a claro Sed frame an asknowledgement fame, and to add three shot inerfme space intervals. A data fame formats identical the frame shown in Figure 9-8. Fr the data ame the cone ofthe various adress tsi determine ty the values ofthe To and From DS bits inthe fame contol subfields ofthe dat frame. Figure 9-11 shows. forma of 2 Regus to Send (RTS) contol rams, Unfortunatly. this chapter wil not be abet delineate al ose an ntl ner within he othe witless station active i he network and provide oe ‘the deal ound inthe IEEE 802.11 stand parca The CT and RTS conifer of Sane dt es te gh of tie fa be mon ve ene ee £802.11 MAC layer Operations—Accessing and Joining a Wireless Network ‘ : Before any transfor of dat can occur over an IEEE £02.11 wireless network access mast be gained ote network Inthe presea standard there ae (wo mets ound t perform this function. The prin ‘ Secess med makes use ofa distibued contol finetion (DCF) that is known as carer sense mui ‘asc with collision avoidance (CSMAJCA). This DF simplemente in ll wireless LAN stations ai ‘ed within both IBSSs and ESS networks. Eseatilly the operation ofthis wireless version ofthe DCF ‘ery similar o how it funtions fora wired Eikernet LANG The sation desing to transmit must physi sence the medium to determine if another station i tansmiting. If no transmission is detected aed ‘medium is determined no to bein a busy sa, the sion transmision may proceed The CSMAVCA aly 5 rithm also includes provisions fora minimum time gap (interframe space) between the transmissions i frames. A tansmiting station will defer uansmitiag until this time period has elapsed. Ifthe wires medium is detemined wo be busy through the use of ome eter nonphyscal methods, the sation desing | toteansmit wll wait uni he end ofthe curent tansisson. After jist completing a sucessful tansmsson or fle deferring tansmission, the wating station wi 4 select random bck time interval before tempting o transmit again, This random backoft procedure 3 ‘ery helpful in eslvng contention confes caused by the possibly of many stations waiting to tans. } Figure 9-12 shows how the collision window (CW) backofT time increases exponentially for each ean mission try. The backoff time is equal toa random aamber (integer ties the value of CW. Fora ervey Wit low uilzton a station usualy doesnot hae to wait ong before beng allowed o broadcast aw frame, However, fora network wth high utzation tee ean be extensive time delays before ame ‘mission is permits even With this backof procedure. ‘Anaudtonalenancemen ted (ofa minimize colons is forthe witless stations involved int aa transfer to send shor contol frames (request send RTS] and lear to send (CTS) fram) Th done ater detrmiaton that the witless mediums il, andar any deferrals o backofs and be rt wise meek td Ken se pl conden fntn tod only ia ESS mo) spat coda OO tatoo ene SI this scheme, the PCF determines which sation has he ght amis The FY been 2 poling fon ofthe active stations n he BSS and acu a poling mes eee, Ge ota wT potncanbecmplesely teens seae gee Rn Fe el caren rat sd ys es pty pon Te Eee ee fs inomaion vin eacn managment fame fat hued et nace aaa BAY) tier within any active station. This act provides the PCF with ont of te WM since ota, f © dcnioe te bye ate fe an, aml. whee See so cmifoe y Tee a many te dei pein of DCF aha wl Be coed ere ene ey ae ont espe wht seen ove moe ates LAN pet se aa eke sa ns DCF nd 1 opin wl poe ee le ant y £ & Wola LANIBEE 802.115 301 Das pe sta smi sar sts sust 300 tution Win Termeni Stems ant ewes the inviaces ofthese topics, Some of the DCF details are MAC-Jevel acknowledgement deen pe of interrame spaces; backorT time calculation; DCF access operation rules (ie, asc acess, backa py codes, recovery procedures, seting and resting the NAV, contol of the channel, RTSICTS use fragmentation, and CTS procedure); dieced, broadcast, and muliast MPDU transfer procedure; ACE procedures; duplication detection; ad DCF ting relatos. Some of the PCF details are contention Petiod (CFP) statue and timing, PCF acess procedures (Le fundamental access, NAV operation d the CFP, PCF transfer procedures, cometion ie polling ls), fragmentation, defagmentaton, mk support, and fame exchange sequences. Since the system is not perfect, some ofthese details outing procedures necessary to recover fom eros in ata transferor inadvertent data collisions. ess Tali "Theat of joining a wireless network occurs short after a wireless stations first turned on. When sia sine powered up the station will ener a passive or stive Scanning mode under software contol. In he pas canning tod the station listens to each channel fora predetermined period. In his mode the station cally wai forthe transmission of «beacon frame having the correct service set identifier (SSID) ta E "aton wants to join. Once the station has detected the beacon, a connection willbe negotiated by ‘withthe standard authentication and association process. In stv sannig, a probe frame i arsine the station. The frame indicates the SSID of he network thatthe station desires to oi. The sation avai robe esponse frame that wll indicaethe presence ofthe desired network. Once the probe response frase Fremont i wl pnd tal joe egestas ofan BSS, he so aS Tat peter beacon fae wl rept pee eqns. Aer he salon a joe ith TBS Ape cores wake Une far be Soa oie ora wasted ben. physi ljerseup paneer led Ue ever 7A hs tine sapere fo tee synchronization proces edt Se up te cds jt gener in te pir dcssion about ing network. A ning spot (TSH wna Kp einer ies ral stat ina BSS syneronao For ab 5S eer Ge provides te ater kt ed or he TE. The AP andy Sa sine aed steht Serine ek ater As The AP pay an pc bx ane ha in ois TS tine The Saosin te SS se he lnfomaion Cindi te beacon re 1 st agen”, Madi eis adorns aloe he wet medio ew Intra TSF timer A staon in a BSS hat has imestamp that doesnot mate the rcived beet VERE saver eomeryeace wees (PLP) The PLCP delnare eanvng el MAC segs enced cj i nest 0 a of he ean, Fg 9-13 shows the procs of pra ral ats (MPDUS ino a sla ing mn One ete ash geet frmaon ‘beacon andthe effect of a basy medio ont proces be seat and received berween to or more wireless stations overthe associated PMD system Since there tos hat on ype of PMD ih cater EEE 802 1) ete ny ea aed reo IEEE 802.11 LAYER 1: DETAILS the phsial ayer for wireless LAN consis of tice fnctionsl emis The physical medium dent (PMD) system, the physical layer convergence function PLCP), andthe lye management une ‘The PMD system defines the specific transmitting and receiving characteristics (frequency of timing, modalation techniques, te) used to transfer data over the witless medium between two [live ayer sevice access pot. In conjanton wit the intetce between the pal laye conver pr pots kaye andthe POM slayer, known a the PMD SAP, sof sevice pias as specified. This Seton i ging to emphasie the physical ass ofthe wiles netverkimplementa pected by IEEE 802.11 and will therefore not provide a get del of detail abou the various mies prising tothe the pyscal yer ois manaemest he eters ent intrest ois, he re ue refer Secs 10a 2 he HELE 80211 andar Bf wpdacd (1955 wires network stand eles fore sof tee feat physical yer mes, aon (ee Sections 1-16 ofthe sada). They a eapency hoping speed spect, det Spread spear, sine, The bse cones of fist wo modes hve fen scssed Blin Chae 8 and the ast ale yet be discs AS most of he caren tthe sta een sociated withthe sca specu chqus, cr emphasis wl be on hse modes of “Tso Daya ean eto ay Mas Figure 9-15 Pern boast of Beacon (Couey of TEES) For an IBSS an algorithm is used that distibtes the generation ofthe beacon over the members BSS. See Figure 9-14 fora depiction ofthis process Bach station within the BSS adopt the timing any Beacon o robe response that has a TSF value that slater than its ova value. The interal stat timer i «642i binary cock hat increments every microsecond. The scurcy of 8 TSF time syd rized to beacon i designed to be within + 0.01%, The TSF also eupports other important Wi ‘network functions. Win he beacon frame Is information sbout the articular physical ayer that ist 302 dive Wales Tcommunitie Som ond Neos Ws LANSIEEE 02.11 308 the synchronization process to provide for the syneonzed frequency hopping fra stations within a BSS ‘o€IBSS network. The FHSS PLME aoceps sevice primitives from the MLME to change the tee fe- quency ata time st by the MLME. A FHSS PLME state machine helps fata these operas ‘The FHSS PMD sublaer services are provided tothe convergence lier through the acceptance of Se vices primitives. The PMD provides te actual signal modulation, timing frequency hopping, and so forth Frequency Hopping Spread Spectrum Overview “The IEEE 802.11 specifications eal forthe use of lequency hopping spread spectrum (FHSS) wing 2.4-GHs ISM band (2.400 to 2.500 GH2). However, these frequencies were not universally aallable ina parts of the work! when the standard was fist adopted. Table 9-1 shows the avalable frequencies in see enone ot oweic bears Eo generate the wanted wiles sign. lth esiver he POM sblye fevers te proces. Te hel lls he transfer ofa data steam adhe delivery of timing ad eee parameter informs the Side b-t_ Ave EE ILI fequnce oA OE (Carey of BBE) eccvngconversencesublayer. Again, great del of etal isbn spp oer inthis hot present He ton ut he bse concepts ave been ouined. inn Hopping ‘eson FHSS PMD Sublyes, 1.0 and 2.0 Mbps B 7% North area tn general the fst EEE 80211 standard only adresse lite bat tcl vanced matt (., : Europe Japan, and North Ameri). However, dissed earth situation bs change extensions __* » Euope HE soe standard have been induced. The ial sand all for dt ate of iter ot? mbps oer the Not Appisble 2 nan FHSS physical layer. The standard called or «conforma ye be abl to operate within the fe - vey ges Intel In Table 9-1, Punbemor, te umber o hopping quence ote wet as aso 0 a ~Srsin Siete oe Table 9-2) within andr 2» _ * _Femee Table 9-2 Number o IEEE 8021 hopping eqns (Coen of IEE) : “ower Li Upper ir ~ Realty Range [eon +d Shorty treater, supplement to the standard (EEE €02114) hat was adopt in 2001 provided x ana on - mechanism to extend the operation of WLANs beyond the original regulatory domains spciied by aaoecne: | 2aanar 2400-24835 Gia Now Ane Tale 9-1" This supplement provides the means by which an aces oi! can povde the required aa 2402GHe 20 Gre "024835 Ge ‘ue! trarsmiter parameters (oan EEE $02.-compatble mobile sain, With these parameters the wis Sato is abet conigure itself operate within he applicable eglations of he geopraphic or poled 2a Ge 2495 Gis 2401-2491 Ga onan Sobdiviion tai lose in. Furthermore, the spect povies the ability forthe mobile stan . mn : — foam between varios regulatory domains, To sscomplish tis enhancement, addtional beacon, probe angie | 24730He 2445-245 Gite Spain fequest and probe responge frame formas ete add (oe Sana that include appropriate county | | pags ote 2.482 GHe 74s 2.4835 Oe Fane information elements and hopping pater information. Other additions and modifications were mae to [MAC slayer fonctioal desertion, the MAC slayer management en, and the frequency hopping physica layer speifistion to facilitate these diferent operational modes and the ability to roam aos, Fepulaory domains For North America and Europe the chanel come frequn-y is defied in Sequential | M2 steps. The band stars with Change #2 at 2.402 GH and ends with Chanel #80 at 2.480 Ge (exctoing Spain and FHSS Physical Layer France). In Japan, the band sats with Channe #73 at 2.473 Mle and ends with Chanel #95 at 2495, (GHz The chanel allowed in ance and Spain wil eff as an exercise forthe reser to dterine. The mentioned before the abit to provide the MAC entity withthe physically service i dependent arenes nee rt the yea ev mr provide tf o2zopied chanel Bandvidh and he hop rte are governed bythe local geographic regulations. the eof various protocols that apt the physical medium othe physial services and farter provide tf sbiliy to wansfer MAC protect data units (MPDUs) over the wireless medium, The use of FHSS for ‘Physica layer serve cae fr thease of an FHSS PLCP sublayer, an FHSS physical layer managemest tity (PLME). and an FHSS PMD sublyer, ‘The FHSS PLCP protocol data unit (PPDU) frame format supports the asynchronous tanspot [MPDUs between stations within a wireless LAN. The PPDU consists ofa PLCP preamble, a PLCP heat, and a PSDU. The preamble facilitates the comet operation ofthe recive citer. The header fed ‘vies information about length ofthe PSDU data Word the ranser data cate in mip, and an err ches field The payload, PSDU, is seat afer undergoing a scrambling proces. To facia the operation of physical layer, the FHSS PLCP consists of thee inter- coupled state machies. They are known 38 team, receiv, and eae senselleae channel assessment (CSICCA sate machine. ‘The FHSS PLME supplies services to upper-layer management ens (MLME). The PLMEZPMD oes ae defined in terms of service primitives. The MLME of an IEEE 802.11 wieles station perf FHSS Hopping Deas The hopping Sequence that is wed by @ BSS should conform to a pseudorandom ten thas given bythe follwing equation, F=f, £2), ft oa where 4 is the channel umber forthe frequency inthe hopping pater and pis the umber of i ferent posible frequency channels inthe hoping pater. Refer back to Figure 8-15 fran example ofa Simple hopping patern. Without going ito Tarte detail, he Sequences are designed 1 maintain 3 mii um distance between hops (Le, 6 MHz in North America and Europe and § MHz in Japan) and are er broken up into sets. Fr Noth America and Europe the net result i the ss of hoping sequences ‘went sc patterns each (atoll of seventy-eght squcnce). The ler geographic areas abesed in he standard ave fewer hopping sence pests avalabe —— 6 ted o Wires Tommi Sys od Nts Wek LANGIBEE 802.112 305 at 5K sts . . . mx tg mn sami oe LS Som fe | ios NS vate 1 [roan [eon | wat } sue | cnet cnet cena raeaet cen ire 9-15 IEEE 802.11 OFSK modulation cess 2nd 4 e916 IEEE 802.11 DSSSPLCP fame fe (Cou ; ISS Met Des FHSS ste te noc foul! Gaui Seaver AE TOA - orn (Coe of EE cepending spon the daa rate Fora date of 1 mbps the into Ds 2.GESK motulatoris either ra pening op so gency hat tex phy ie ower hun he tae SS re ect et, The oi egene hit rm he chanel en We is s160KI Foca See peopl to te #OFSK mains oe of fou sible 2 ny TST dau ate of bs eo cc te or dire combiton, Howse, gah Bow tle re es resingy, fur vl in moaaaion SLi aN i pe sane anh sgl is ectige rovies he yem wih hanih ae gre lst the modulation proees orbs 2nd eve Co ine) Fi ser out power vel om an EEE 6211 san shal lo 10 0 ae mi pal ones power (ERD) Pte be aon cr Dons Ce dr of ca ee prov bikie station poet onl tw et oad lr lowe. The sve hui havea sent of ea So ita ate of ey Sy o.75 dB fora datacom Tien omens a 1 aby and pu) of 38 for BSDUS of 40 byesin ag. Te ad lo upon SS fame ee ie ects sons sone might suis he nad Es many Hs ST Se ape imennolon est, Heenan fr enon Os es onc he wes an tnt wil te ara Rr ee of He mii ‘Sevanoe to che basic system operational concep Face pantie, PLC ele, an an MPD The FLCP pene coins tein wild 7 ame es SF Teton i ni of a8 ea 6TH Pe a te yin oft ie, Te 1 SED sedi ee he st of Seri i pic LCP eae ld comin four ses, ti sigma. eae eg el 4 TEU CRC Bl The sil el inne be lion Ore ere Le ls eee fer ft, he gt ed nates he bec of iOS 2 MED oom Yow "=I yr) ana ie CRC fel or ero ton, ee er eth SSS py layer ae scab eoetasmision an nian sono. om crm dc a CDMA econ, ed fr ies bist ie fea of DSSS oma Se aca er aa tae vee ame fete llcaon athe ne ine Te a ec sbecae esl Wah codes wed spea he Sat ands invia aS eran EEE ST 1 wiles LAN oes tal fortis ype of oe a ei el eral easier in te network. Tete, fr DSSS WLAN Se Se on PU cot cx onl cle canc sessment ie en, We ve ae eine opr cenit tenn nd wilt a Osh car canal ive bs bra et othe MAC he MAC lie 2 ‘peat the el ecko LCP. he necessary steps il be ew cost ie PPDU a ea hs frie FSS PCT, be DSSS PLP est nei poses at Direct Sequence Spread Speetrum Overview te modeled by state machines, ‘te IEEE on. gcnos cal fo ewe of est sequence ead peau (SSO ove He TE ra eed for in the Unie Stes accor © FOC 15247 an in Ear OE Se Mosse roves a wires LAN with oh ad 2b a as TS) 3A Te eal ors roses gan oo est 10 he bend tl se ccf mepenih an chip PN coe, To poe bere ana eT chip at ee of either ental binary pase hit keying (DBPSK) ot iene gro ye (DOEST) Sr te FHSS ahem aay prove, te OSE ot LH Be gS PLE slay, 3 DSSS py lyer management ety (DSSS PLM) an is ve [DSSS PDM sublaer to transporte data wiles between stations. DSSS PMD Layer “Asshown in Figoe 9-17, be wansmiting DSSS PMD soblayer accepts PLCP sublyer seve pms Meow dc the piyiet means by which ata transfers can aca over the wiles mem, Ne Hane of ts ink the DSSS POM svbayer primitives and parameters for the eeiving function Pe at ea st, ing inert, sociated received signal prameters tothe PLP we 35 Physical Layer Details ‘DSSS fequeney chanel plan is shown in Table 9-2, Al chanes med by an °X" must be s- ed foc use inthe vaious counts inficaed, Te spending sequence used by DSSS, own as an 11-bit Baker sequene, is ven Be: peels [DSSS PLCP Sublayer Poe DSSS PLC? sobaer is some diferent than he FHSS impmentsion and errs Ws ras p91 sows te DSSS PLCP fae frm ht compose FFDU, Hens of 4 hotly lel thal, 306. Inaction Wine Teemmaniatins Sens and Nears Wire LANIERE 52176 307 tec srt er _ oe tt a 5 We sam, oe ae wae | sa | sey, a a [comin Il Fill rn nn ni nn apes [7 DRL stinee om DSSS PMD Sables _— as Pe sehr. i" ‘Spreading process using the Barker sequence. Figwe9-17- penton fh DSSS PMD sper (Comy of EB 5 Tle 94 IEEE502 D555 ore Coty EE ‘Table 9-3 IEEE 802.11 DSSS frequency channel plan (Courtesy of IBBE). me Oui Power fesion Lovotionce 1000 aww Uni Sus roca —— Reply doi . {om Gy expe Etim008 x10" x20 x30" x3 x cowiio | treweney | Fee | “ee | Err | Sam ae ‘oon ‘ipan | Monin Reaaiag —— Rado Fane are 95) L 2412 MHz x x x — - [2p ume Pox pox Pox PhP ovis or power cpa een 100 Ws be prove fr ons apt of agus a =| fay tin Com. Tc sands pists evan ma idee ee ae eee 3 | aman | x 7 = era) THeDSS reser mate opondesmun ake os ieehe Fe ee =| —} Peete ra si cnt alim gtd Pre eae en | eyelet 20 Mie at mabe pene thn 8 rete mn FE Rea we fox fox fox fon pe mc seiaios ir ive the cea chamel anes (CCA) operon nea me s_| wai — hen the aio channels busy oil. " tetas 6 2437 MHz x x x = = >| ame | x | x | x | — | — | — | }: trad Overview “ — |= || ony coments wit eof ee south iar mode of wile a ‘ of wisess LAN operation. Ate ine «| arm [ox [x «Sint sand oR pyle mae pet ee a in ear cal eon a ee of sm [Pe fT fee came pes en lei el x | — | J SRRRB ttn te B95 gr snaing nes Pe ld ree | wm | x | x | x | x LAN implemen te TR ds th standard cal for ete Soe op Taya. hen i oie fr wie ofp samt ba Ne es es ce F APE ie. A ast mento the matiman nated byte see en se eS x ces fg aa, eld tee wala do a ek etic msg {sion whaler dete ae any sigma Iasea oso B 2472 MHz = = x = x 1 pena | — - ~ = = LANDS nT 1 ge nt Pp i AN a ee a Fae gt pte octane hme cs erm ys Sah anthaina nyoad co Samet Meee eee |, several higher-datarae extensions were added to the stad iil modsation schemes andthe use of a new hand of 308, fandcton Wiels Tiemann Sys nd Networks Wide LANVABEE 608.112 309 sequen int 5-G range. Tes ena the wiles LAN sda ame 0 or Fearite forte feeling WLAN indy, As mentioned cater, data taser spnis of 1 and? mbps ‘Readiness, were way blow what wie LAN ser ad become wecustomed ©, The sas Movided ata Canter rates iat were compatible wit wired LAN rats andi the proses agi ses TANS ito he mais of computer aewoig For the ist ine th IT deparinents ra acco anal enterpses schoo! stems, and ober compuer network: ses had anatbe choce aoa ae to computer awore inratrtare. The details ofthese thee extensions willbe deserted \ jor eas Sie ae text inthe order of ther adoption [Bie [tier | rete] rete Tp TEE 802.11b IE 02h waste frat extension tobe adopt provides higher see physieal yer extension sare OL Gts band by employing more complex modulation scores, The rt extension ads dares sn aad Tl nip nae ote legacy I and 2b tes To provide the bighe as hip eee cay cade keying (CCK) is employed forte modulasos seme. Since the same cipin ae ei Peape te ted fo th ww higher data ns, th final signal bandwith sth same a the gin! Sa SEM Thence hight cape offered by 802.11 is known as high-rate DSSS or HRIDSSS. HR-DSSS sa nee PUCE frame forma s the intl DSSS physical lye and ueefre bot ats sts cn Be sae rine sune BSS, wit ate switching occuring during the wansfr of the PSDU: Figue 0-19 shows At ong PLP forma th i silat igre 9-16 excep fr he ferent rst wed forte tans eer pe FSDU. Besides the higher-sped extensions to the DSSS system, several oponal features ‘Soc PACP Rent | Sit PLC Heder [eiinatiies | nent. | a2 Sheil PS ee Figure 9-20 TEEE 0211 dee PLC rat (Coutes of EE). etienlancemens tothe sandr moving the system ado tansmission prorat, mand a count E ‘Sysel “3, ie Seve wz] ac toe ithe | the [soe | totes: | tomar Tales 1 = a aatine 7PM gongs MOM HONE ayy, . oe onerous Neth Ars Puerto toe | TU rs — f a ip Des Tat 2 DOr soe oo 2 ote 280 te Seem ce vlan Bin iN A iere9-19 IEEE 80 dbong PLC? fomat (Couey of EEE . i Fgure9-21. The two bis hoping heres salablefor nN Aner (Cues of EE. “An optional encoding mode replaces the CCK modulation with packet binary convolitions coding (UUESSSIPBCC). Tis option sas added with am eye toward te fur a he wie of PBC wll ost {hel frat anal ate nceases, Ano posible opdonal mode replaces the lng PCP preamble nth ashocter PLCP preamble (se Figue 9-20). This option provides higher data throughput rates fr the iS and 1-abps rate es by redcing the overhead involved inthe wansmision ofthe preamble. This mode oé operation oven a5 HIYDSSS/shor. Farther, HR/DSSSIsbert can coexist wih the oer [DSSS pls layers under cern cicumstances. A final optional cpabiity incloded in 802.11 that of Chanel aly. The use of equency hopping even ona Limited bass provies improved rao Kink perfor ‘anc in the fae of eetain types of EMI, Figue 9-21 depicts the two bass frequency hopping schemes taille for use in Non Amesca with IEEE 802.11 802.1 1b Modulation Schemes Fra ne ich withaon laon fmt a cee 2b tn yal eT wy cope! re a tec at ema he esterbe highpass we CC or onl PUCC mae re pe CK modaaton ms espesgcr tassels a bad en Ele mbily to the wer. At he sane ine, the wiles hacking peice! ad the ack ofa eobut th treat gpa eae ann ea Se ir heea ban re ne aa F cniameedeec radmin seas caeican Bt ficsing he ls wits LAN iy, ick eve of some of te poplar cks on these networks will be instructive: . ore rgnes eme veto he akr ie pte conmeniconso scsi infomation by ic ‘ening to wireless data traffic. oe NAC pong mack teed MAC aes of eine evr at tks tea oe pn ce wo be wee eter Beary tke tar enna ps sr aa ten een Nanshe-e cc tr pone ema es pi no xin es Sve tr nfomao pessoa utes) oe» gna wr a as eal tendo oh wie age sos ptm Tet wc nee ne a hgh ion wis AX intact esing fn ISP po ated orth al send of {Spam) from the compromised network femal Sinem Nici Ge ata trol ext ns scaly aeicad oh tok, Scns danseition name he let wig te MAC ws fh ws in, tes ‘Senin ae spot ysoig he MAC ats tt et DSSS-OFDM Operation ‘A few comments shout DSSS-OFDM operation ate appropriate ere. Fortis combined orm of operation, the PPDU foumat speified by the IEE 802.11b extension shown previously as Figure 9-19) is relive tinchinged A Barker symbol modulaed preamble (DSSS) is til used, However, he sngle-carir PSDU {replaced by 2 PSDU thai transited using OFDM techniques. The IEEE 80211 specification out Tes the netded radio and physica layer behavior needed to anion from the DSSS preamble tthe LUnbMencoded PSDU dais The OFDM system exployed ie banal to that dese peviousl (i, {yo seater ina 20° MHz bard) except forthe fact ha itis now specified for operation within 24-GH band 9.8 TEE 802.111—WIRELESS LAN SECURITY [Although itis dificult o understand the motivation bind ther actions, its a fact of life tha thee 8 ial bat ute pest and if you wil, quay malicious group of so-called computer hackers. These Tndividuals ae comin inventing ew compute iss and launching tacks o the world's comps fin comptter networks with these rage proprams. Although the Item is typically used asthe ia “elvery mechanism these computer vinss programs often use infested machines to pass the viruses on ‘Stir machines on te same compu network or oer compater networks (aga, via the Internet). Th tl intent of hese virus programs o cause arm tothe operating system ofthe infected maine and the data thas conaned on the stim’ bard ive In sore eases, these hackers ae content to take cs: ttl of “hacked” machines help cary out deis-t sevice attacks on a particular computer network network age. ‘Sill another group of computer eters has seen the advent of witless LANS as an opportunity (ey ‘would cll a shallenge! to hack into these wirlest etvocks to gun fre high-speed Interet accesso [rcs to someone else's Intranet. Ationally, many ofthese individuals have sen itt setup wires CANS withoot secur and offer Inset aces for fee to anyone in the coverage aca of the open nt tvork Although this group often proses is monmaliios nts, some inthis group have gone asf to sure various geographic loestons asa form of a wieless LAN scavenger hunt or game. These wi Tess LAN sevengars or wardrversas they have been named oftentimes wil goa far to publicize oP ‘r nsecurt wieess LANS on lnteret Web sites o to mark the sidewalks of major metropolitan ci with cryptic symbols (Enown t tbr wardivrs) indicating the presence of such an open ices Work resenty here are various fe software programs available tha, in conjunction with a wie Teework card (operated in RF monitor mode), allow one to detect the presence of wireless LAN ne Sd to detsine the level or lack of secuty employed bythe particular network. Infact recent sure (Good) of ening wireless LANs indicate thatthe vat majority use eterno security or minimal lve “nital IEEE 802.11 Security ‘oe orignal IEEE 802.11 standard included limited authentication protocols ad, as it rnc out, a weak form of data encryption. A casual overview ofthese procedures was presented eatin his chapter ding discussion af the serves offered by a wiles network. Sinply pt, the inal IEEE 80211 autentcn tin process supported MAC authentication of wireless clients andthe standard allowed for what wat Pinon as wied equivalent privacy (WEP) encryptice, ‘Authentication Details BBE 80211 performs use authentication inthe folowing fashion: only tfc from authorized MAC dresses will be allowed though th acces point. This is accomplished by checking the MAC aires o be station requesting association agunst the access points own database of valid uses or through + DIUS (remote authentication dian user service) Server external othe access point ht i wsed fo rl network authentication. However, this typeof authentication is considera inadequate dae 1 the that ic maybe circumvented and because itis uateral innate For this case, the process of athent Bétimate one. Also, since authentication is prfoaned on the hardware that e beng wed and notte te Users deny, its posible thal equipment olen from legitimate wer could be used to jin the net / — 316 fades o Winder Tecoma Stat and Nes standpoint a user could unknowingly associate with a rouge access pint snc the user des not athe cate the acess point Tis manin-the-miadle stack could yield estcted information that could be ued ain acces to the actual witless network WEP Encryption Details ‘The WEP algorithm is symmetic in nature, The same key is used for both eneryption and decryption. he [WEP key used to encrypt wireless LAN tfc consists of tvo parts a 24-bit nlizaton vector (IV) ad: 40-bit user-defined key. The TV and the user key are combined to crest a 64-bit composite key thi iu to encrypt the user dita during the tansmision process as shown by Figure 9-25. As shown by the dy fam, the 64-bit key i applied toa pseudorandom number generator (PRNG) athe sae tne the deg Steam is wed to calculate an imegriy check valve (ICV) © prevent unauthorized modification ofthe agg “The ICV is appended to the data andthe resulting data seam is mathematically combined withthe cx length key sequence. Finally, the IV is broadcast in the clear together with the encrypted data ay composite message. ‘ett Sankey ol see Fe Praiotest fal maxey). Lie} —le ‘a Ck ip Figure 9.25 WEP encnpin Hock gam (Couey of EE). Figure 9-26 shows the decryption proces that occu afer reception ofthe tresmited dats, The inane 5 ing V isused to generate the requzed key sequence to decipher he incoming mesage. The nei ced f= slgoritm i peeformed a the recovered data and the results compared othe transmit ICV. I the ‘ales of ICV are not qual an err message is Sent to MAC management 55] igre 926 | WEP deco lock dierm (Corey of IEF. aid nt take long fr several academic researchers to discover nd sbsequeily pint out he bites ofthe WEP TV keys (eg. see “Weakess inthe Key Schedaling Algorithm of RCA” by ‘Manto, and Shami), As discussed earlier, the RC4 algorithm developed by RSA Security could be {airy easily by free software programs posted onthe Inert. Wid LANVIREE 8021s 317 f#:2E 802.11 Temporary Security Enhancements sou a5 it became well kaon tat te orginal version of WEP could be hacked fay eal, several 1s began to offer eakancedpropictary forms of WEP tht woud allow equipment he capability of osng the weak IVs during transmit eyes. This wat most effective in wisess LANS tha sed the sox eauipment fr both he stations andthe acess pont. Lae, multilevel WEP was inrodoced with 128. and 152-bit user fey, anda more robus intermediate soliton of Hix that could be applied ing Wircess LAN hardware was dried from he daft version of IEEE 802.14, This ix is known a5. | 31-¥i protected access or WPA. WPA isa specification of standards-based interoperable secuity faperacements that improve wireless LAN secur. WPA was designed to run on existing hardware Fefoeh 2 software upgrade and provides beter da protection and acess contol 1 wieess LAN. Data [ation is improved by using the temporal key ingrity protocol (TKIP). TKIP enhances WEP by using ke key mixing function, a message intr check (MIC), an extended inialization voce with cing rules, anda rekeying mechanism. Addticaly, WPA supplies Enerpis-level wer authentca- via IEEE 802.1x (the standard for por-based network acest control, adopted in 2001) and the ible authorization protocol (EAP). Together these technologies provide for 8 mich seonger user eaication proces. The key to this autbentcatic structure is the ase ofa centalized authentication EADIUS) sever and mutual authencaton to prevest ma-in-te-mide tacks her Deals of EAP and TEBE a. 1x Te IEEE 602.1 framework is Based on the Intent Enginecing Tsk Force (ETP extensible authori fi jrsocol over LAN (EAPOL) messages. Due to contig intrest among the wires LAN vendors, 8 sizaon of EEE 821i was delayed epee. nthe meantime, sever indy Ro¥ps a vex Hh poet ti own shee sols tte sry problem before the ia adoption of he TEEE 11 standard. The et esl ofthese ations was that various forms of EAP were developed and es for use. Therefore, this time there are a nub of EAPoL autentiason protocols thatthe wire LAN wer may coos from. The mos conenon pes of EAP ar listed ber: - ‘EAP-MDS (message digest 5) i 4 weak foo of authentication. Since it only offers client-side = scaication it wll tbe used when the highest level of secu is needed. 1 EAP-TLS (eansort layer security) bas no own security weaknesses and has song supp rom Mirosof.Krequies the we of « RADIUS seit and digital ceifiates at both he station ad the ef RADIUS server. tis supported in Windows XP and there ate updates to spor iin eater Win- Be. dows operating syste versions. LEAP (EAP Cisco Wireless version provides fay ctfectve way to secure wireless networks PPS wes wing WEP based devices. Is vlonble to cionary stacks nd Geer is at recone Fmd for ase with IEEE 802. EAP-TTLS (auneeled TLS) and PEAP (proete! EAP) are sinlar EAP atentcaton protocols that 2 sported bya lage numberof wiles LAN vendors These protocols alo wse digital cet > cates bat only atthe RADIUS server. The station authenticates the RADTUS server using the server's liga eft, and secure tunel isthe setup betwen the station andthe sever through which 26 the ervercan then auteriae the sation lscach case, when a sation attempt comet ta wiress LAN under IEEE 802 1x the aces point cate te sation to comect bt ta forces iin an unutorzed tate in which oly BAP afi is Be slons tothe RADIUS server. Using EAP messages and either past words or pubiiprivat key Brion technology the RADIUS server will utente he station, Net the RADIUS server will po- i encryption key that wae derived frm the station through the proces, The secess point then geeratesa second ky for ue in communicating with te st es the second key withthe inal key fom the RADIUS sever and sends itt te station. The at tn elses keys the station eid toca tha secant ot broken, Figuce 9-27 ‘18 ft t Werk Tecoma Soma Neos reanrns.ns, naps ers on Asien Ca earn) sneer RADIOS fees tox Wie News Figure 9427, WPA operon wth EAPTLS shows this paces in more deta or he EAP-TLS protocol For the EAP protocols, new tems have been ineodueed: the station is known a the supplicant, the access point isthe authenticator, and the RADIUS server isthe authentication sever. IBEE 802.11i—WPA Version 2 IEEE 80215 wat finally ralifed during 2008, Kis ako knowa as WPA version 2 of WPA2, Also, works employing the IEEE £02 i standard are known a robust security networks (RSNS), WPA2 wes an advanced form of eneypion known as AES (advanced encryption standard) tat allows fr compas biliy with FIPS PUB 140-2, a U.S goverment security standard In an effort to preven a reocevrence af ative role inthe deve ‘opment ofthe TEFE 802 11 andar. AES is block per that was chosen frit robustness Presently. it the WEP security problems the intemationl cryptographic community ply ‘esis all knowa techniques of rypanalysis. ‘As of this sting, RSN-certied wireless LAN equipment is available inthe marketplace. This fact soul provide many telciant IT departments with the ps needed oa wieess LANS to their network ive security measures by adding rouge access point detection and ntifeaon schemes to IEEE 800.1 1-complint wireless acces point. ‘Onc might question what canbe doe with legacy wireless LANS that consist of eriginal IEEE 802.10 equipment tat i either not compatible with the new standard os not upgradeable ot In these cases, itis possible to run both simultaneously if certain additonal measures ae pu int place, For mixed-mose tterprise networks, ruin vial private network (VPN) software on legacy stations and moving legacy cess points outside 2 firewall is one possible solution One final noe, thie shore weatment ofthe tts of witless LAN security is not meant to be exhaustively comprehersive ints scope, and tis hoped tha he readers wih an interet inthis topic wil val hemseves of the many releences eval infrastructure. Additionally, vendors have already implemented pre 9.9 COMPETING WIRELESS TECHNOLOGIES ‘As was the case with cellular wireless, th est of world has alo been working on regional o atonal wir less LAN standards, The most noteworky projects willbe mestioned het. HipeLANI and HipecLAN2 te the European equivalents of the TEEE 802.11x standard. The reader is diected to the HiperLAN2Y _lbal frum at ws hp.com fr the most up-to-date news about this technology Wines LANIERE 02.116 319 x outdoor, fixed operation, and HiperLink with 155 mbps over a fixed backbone }. HiperLAN? is a high-performance, next-generation radio LAN technology with its roots in the Wireless. see err Lt em cet en asf aces li fee reat gt tay snc rn al ps is ee one te nso are cme pe soa se ee a mt pores oe mo gota rn Cermateea e ee cle oe rem ne a perenne mes se os nes ‘HomeRF and MMAC | HomeRF working group was formed in 1998 with a gol of providing an open indus specification e known as SWAP for the purpose of wireless home networking benveen PCs and consumes eleconic [cvies. SWAP (shared wireless access protocol) was o operate at 2.¢ Ge, use FHSS, an provide data ines of 1 and 2 mips. The eal venion of HomeRF were incompatine with TEEE 802 Ibn 202 the "grup moved toward the endorsement of IEEE 802.1la a5 the next geeration of wireless LANS. The “HomeRF working group disbanded in January of 203. ‘MMAC stands fr multimedia mobile acces communication. This isfy recent Japanese inistive that appears to bave just as quickly faded away. Recall hat IEEE 80711) hat bas recently ben adopted esses the Japanese market. The IEEE 8021 x standard has proves be an impressive make der {nd may Soon prove oe the defacto worldwide standard for wireless LANS if that snot lead the ease, 9.10 ‘TYPICAL WLAN HARDWARE Prsealy, the consumer may purchase home (consume electronics) wreless LAN equipment (aio cans snd APS) trough numerous real outlets, or more robust “industrial quay” hardware implementations ofthe IEEE 802.11x standard trough the sles dstibtors of these products. Typical versions ofthese oducts ae shown in Figures 9-28 though 9-3, ‘As meationd earl, PC manufacture are stating to integrate the wireless LAN statin funtion ito ‘te legacy PC, apap PC, able PC, and PDA. I wil nt belong bef this functionality i also provided Ina 3Genabled subscriber device. Hardware Setup [Tepe sew postu for a alla cad (a eansccver at plus into a PC or atop compton FAP are uit sirihforeard, Software divers provied with the prt supplied withthe PC operat. fing system ae usualy easily instiled by users. The radio card oltre driver typically offers a ‘coniguron uty that sinpies the mangement and configura ofthe car. The Wpkal font that canbe managed athe network assocition and basi coin parameters Apia associaton Ls 3920 Intent Wik Teams Sens and News Figure 9.28 Wiles LAN notebook alo cad une 9-29 Consuner gay wie LAN ace pon. Figure 9.30 Connerly wks LAN sce pot, Winds LANABEE 802 17e $04 Fue 9.31 Tpial WLAN svacinnifrmaton cee. ® seen will port vatious stasis suchas operational mode (802.11, 802.116, et), association sae, net- work name, chanel, security parameters, signal strength, selective packet tanner rats, istry of packets sen and eeived and other miscellaneous system sass. Sec igure 93 fora sree shoo ‘peal association infomation seeea, The configuration unity typically allows the wserto configure basic network associations, wireless ecu sy, and advanced system parameters. The base configuration usually deals with the pe of ectoock (eter 2 hoe o aces pin). se tad hoe o pert per, several more parameters nine te dined facie this ype of operation mode, nctwork nae, chanel encryption keys, ec). For AP operation ‘any of the operations perfomed are automatic. Other options to st ate tod, auto mode preference, over savings, and roaming. Te security configuration wualy les the user set he etl of cca deted from none wo some highest available eve Depending upon the dae of anufactre, today's wieean | aN secu has been enkanced to provide 64.128. or 12-bit WEP encryption, other forms of propictary ‘serypion schemes: and uimately RSN (EEE 802.11) security. Advanced system stings got deat wih the use of RTS/CTS, fragmentation options, channel assignment, and tans ates. Adina fe tues ofthe confgurtion aly are the presentation of network statistics, These sases ae tly ‘valable i several propia forms (incoig rel me bar eaphs) abot the number of pacts seat and recived and fine details about the type of packets, transmission ee lest ACK RSS ition (RSS, tors, an so forth, Also typicsly avaiable within the configuration lity iste RF moator function that can provide ado link parameters and display information abou all the wiles networks tht ae opcr sonal within the tation’ eciving range. Some products also provie a "snoop" ool that allows te {system sen the entire 24- and 5-GH bands. With this took one may determine ite it any witless setwork activity cantly taking place The setup ofan ao56 point is usually peformad though the sme general metho asthe radio cre ually 2 Windows-type AP management program wil be supplied withthe AP. Tn this case, the sce Pont will sully be addesod over the wited network its connected to though & defi eft adress will be enter intn the acess pint manages sftvare and tc ascmannges wl ale fs itvoke manggement and configuration wiles wo setup the AP. Most ofthe details preseted about the Stnconaty of the radio eard configuration utility may also be applied wo the AP management software Freseaty, most major manufactur of witless LAN APs also ollr software management oa tht po: = tides contol of a network of APs. Another system solution tat is Being wed forage witless LANG wth ay APs isto employ an AP controller (APC) to provide management ofthe oth APs and thus of load Ing most ofthe management function fom te cher APs 922 fedusion Wires Tbmnatns Stems and Nets ‘Atypical implementation ofthe access pont for «home network consists ofa winless access point route combined with small four-part switch as shown in Figure 9-28. This device provides an Eteret ‘Rien ta high-speed eable modem or xDSL conection and allows a shared accesso the high-speed saeteon dough wed Etheret LAN connection via the four port switch or wireless access though te ‘ites AP secon ofthe device. ‘Moat wireless LAN products come wih quality documentation that Teas the buyer though the setup produc in ensy-tofollow “plug-and-play” type sep. This is one more reson why he ake-p rae of plas TREE 802.1Tx LANs hasbeen accelerating ata exponent rte and moving into the consumer rakes place less PANSIEEE Olea eat QUESTIONS AND PROBLEMS 1. What are the base goal ofthe IEE 802.11 witless LAN standards 2 What data tes are supported bythe tal IEE 02.11 witless LAN standards 3, What are the IEEE 802.11 extensions? ‘4 What isthe simples wireless LAN conigurtion pose? ‘3 What function/purpose does the wircess LAN aces point ave? 6 What fundamental difference beween a wieles LAN and a wired LAN? 3, Destbe the base structure ofa wieeless LAN independent basic serie se 4 9 Describe the base structure of 2 wieess LAN ended service set network Whe base anctions do the tation services provide forthe operation fa wireless ANE 410. What basi unsions do the dstbson services provide forthe operation of witless ANT 11. Deserbe the wiles LAN association function 12, Desrbethe wiles LAN diasoclationfuncon. 1B, Describe wireless LAN moti. 44 Deribe the dference between lass 1 and Cis 2 wireless LAN frames, 4S, Name the thee types of eles LAN MAC frames 6. How sa wrelew LAN base service st identified? 12, becerbe the basic procedure employed to gun access to and to subsequently pin wieess LAN Uj campeon ofthis chapter, the sen shoud able: lan the be dfeences betwen ils AN and WLANS «isthe evoition ofthe EE 802.15 sandal fromthe Blutoth sand + Dicuss the various yes of witless PAN woke that ma ithe vats pf wiles FAN mwas at maybe Se pander he EE 82.15. “+ Dis he deta ofthe WPAN phys and band yer. 7) Dsus the Blutooth proto ack

You might also like