Professional Documents
Culture Documents
Wireless
Communications
m.d.hope@salford.ac.uk
Newton 262
0161 2953305
High-Speed WLANs and
WLAN Security
High Speed WLANs
3
IEEE 802.11a
4
U-NII Frequency Band
802.11b uses unlicensed Industrial, Scientific,
and Medical (ISM) band and specifies 14
frequencies
6
U-NII Spectrum
7
Channel Allocation
8
802.11b Channels
9
802.11a Channels
10
802.11b vs. 802.11a
Channel Coverage
11
Orthogonal Frequency Division
Multiplexing
Electromagnetic waves reflect off surfaces and
may be delayed in reaching their destination
Figure 7-4 illustrates multipath distortion
Receiving device waits until all reflections are
received before it can transmit
Increasing speed of WLAN only causes longer delays
waiting for reflections
12
Multipath Distortion
13
Orthogonal Frequency Division
Multiplexing
Dating to 1960s, OFDM’s primary role is to split
high-speed digital signal into several slower
signals running in parallel
Sending device breaks transmission into pieces and
sends it over channels in parallel
Receiving device combines signals to re-create the
transmission
See Figure 7-5
14
Multiple Channels of OFDM
15
OFDM Breaks 802.11B Ceiling
Limit
Slowing down transmissions actually delays
reflections, increases total throughput, and
results in faster WLAN
See Figure 7-6
16
OFDM vs. Single Channel
17
Modulation Techniques Vary
Depending on Speed
6 Mbps—phase shift keying (PSK)
Encodes 125 Kbps of data on each of 48
subchannels, resulting in 6Mbps data rate
See Figure 7-7
12 Mbps—quadrature phase shift keying
(QPSK)
Encodes 250Kbps per channel for 12 Mbps data rate
See Figure 7-8
18
PSK
19
QPSK
20
Modulation Techniques Vary
Depending on Speed
24 Mbps—16-level quadrature amplitude
modulation (16-QAM)
16 different signals can encode 500 Kbps per
subchannel
See Figure 7-9
21
16-QAM
22
64-QAM
23
Higher Speeds
24
Error Correction
802.11a transmissions significantly reduce
errors
Minimizes radio interference from outside sources
25
802.11a Physical Layer
26
PLCP
27
802.11a PLCP Frame
28
Fields in PLCP Frame
Synchronization Tail
Rate Service
Length Data
Parity Pad
29
802.11a Rate Field Values
30
Advantages and Disadvantages
Advantages
Good for area that need higher transmission speeds
Disadvantages
Shorter range of coverage
Approximately 225 feet as compared with
375 feet for 802.11b WLAN
31
IEEE 802.11g
In 2001, IEEE proposed 802.11g draft standard
to combine stability of 802.11b with faster data transfer
rates of 802.11a
Operates in 2.4 GHz ISM frequency
Has two mandatory modes: Complementary Code Keying
(CCK) mode and Orthogonal Frequency Division
Multiplexing (OFDM)
Offers two optional modes: Packet Binary Convolutional
Coding (PBCC-22) and
CCK-ODFM
802.11g products made available in 2003
32
HiperLAN/2
33
HiperLAN/2 Protocol Stack
34
Physical Layer
35
Data Link Layer
36
Radio Link Control (RLC) Sublayer
Three primary functions of RLC sublayer
Connection setup procedure and connection monitoring—
authentication and encryption
Radio resource handling, channel monitoring,
and channel selection—automatic transmission frequency
allocation (known as Dynamic Frequency Selection (DFS)
Association procedure and reassociation procedure—
standardized handoff to nearest AP
by roaming MTs
37
Convergence Layer
38
WLAN Comparison
39
802.11 Security
40
Authentication
Verifies user has permission to access network
41
Privacy
42
WEP
43
WEP Privacy Concerns
44
Enhanced Security
45
Additional Security Procedures
46
802.1x Security
47
Other Security Steps
48
Access Control List
49
Higher Levels of Security
51
Chapter Summary
52
Chapter Summary
53
Chapter Summary
54
Chapter Summary
The new IEEE 802.11g draft combines stability
of 802.11b and higher transfer rates of 802.11a
Uses 2.4 GHz ISM frequency
55
Chapter Summary
HiperLAN/2 connects cellular telephones, ATMs,
and wide-area networks
HiperLAN/2 can use IEEE 1394 (FireWire) high-speed
external serial bus, transmitting at 400 Mbps
56
Chapter Summary
WLAN’s greatest strength—allowing users to roam freely
without being connected by wires—is also its greatest
weakness
57
Chapter Summary
Because of limitations of IEEE WLAN security,
enhanced security measures should be used for
wireless transmissions that require protection
58