Introduction to IEEE Wireless LAN

Size: px
Start display at page:

Download "Introduction to IEEE 802.11 Wireless LAN"

Transcription

1 Introduction to IEEE Wireless LAN Li-Hsing Yen Chung Hua University Fall 2006 Difference Between Wired and Wireless LANs The medium impacts the design stations are mobile different MAC 1

2 Medium Impacts shared medium. unprotected from outside signals. significantly less reliable than wired PHYs. dynamic topologies Mobile Vs. Wireless Mobile moved from location to location, but is only used while at a fixed location Wireless access the LAN while in motion 2

3 IEEE 802 Committees SEC High Level Interface (HILI) Logical Link Control (LLC) CSMA/CD Working Group Token Bus Token Ring Metropolitan Area Network (MAN) BroadBand Technical Adv. Group (BBTAG) Fiber Optics Technical Adv. Group (FOTAG) Integrated Services LAN (ISLAN) Standard for Interoperable LAN Security (SILS) Wireless LAN (WLAN) Demand Priority Cable-TV Based Broadband Communication Network Wireless Personal Area Network (WPAN) Broadband Wireless Access (BBWA) RPRSG Resilient Packet Ring Study Group (RPRSG) IEEE IEEE a IEEE b WiFi IEEE g IEEE Bluetooth IEEE e IEEE f IEEE h IEEE i Security 2004 IEEE TG2 IEEE TG3 IEEE TG Specifications One MAC specification CSMA/CA Three Physical specification Radio Frequency hopping spread spectrum (FHSS) Direct sequence spread spectrum (DSSS) Infrared Red 3

4 IEEE Family IEEE b 2.45 GHz / 11 Mbps (300m range) IEEE a 5.8 GHz / 54 Mbps IEEE g 2.4 GHz / 54 Mbps 2.4 GHz Radio Licenses NOT required in these bands 5 GHz Direct Sequence Spread Spectrum IEEE IEEE a IEEE b IEEE g Standard for WLAN operations at data rates up to 2 Mbps in the 2.4 GHz ISM band. DSSS modulation. Standard for WLAN operations at data rates up to 54 Mbps in the 5 GHz band. Proprietary rate doubling" has achieved 108 Mbps. Realistic rating is Mbps. Wi-Fi or high-speed wireless 1, 2, 5.5 and 11 Mbps in the 2.4 GHz band. All b systems are backward compliant. Realistic rating is 2 to 4 Mbps a backward compatible to the b 2.4 GHz band using OFDM. Orthogonal Frequency Division Multiplexing 4

5 Standard a b g Bluetooth Data Rate 2Mbps 2.4GHz 54Mbps 5GHz 11Mbps 2.4GHz 54Mbps 2.4GHz Up to 2Mbps 2.45GHz Modulation Scheme FHSS or DSSS OFDM DSSS with CCK OFDM > 20Mbps DSSS + CCK < 20Mbps FHSS Pros/Cons This specification has been extended into b. "Wi-Fi Certified." 8 available channels. Less potential for RF interference than b and g. Better than b at supporting multimedia voice, video and largeimage applications in densely populated user environments. Relatively shorter range than b. Not interoperable with b. "Wi-Fi Certified." 14 channels available. Not interoperable with a. Requires fewer access points than a for coverage of large areas. High-speed access to data at up to 300 feet from base station. "Wi-Fi Certified." 14 channels available. May replace b. Improved security enhancements over Compatible with b. No native support for IP, so it does not support TCP/IP and wireless LAN applications well. Best suited for connecting PDAs, cell phones and PCs in short intervals. Adaptive 5

6 Spread Spectrum modulation schemes ease address problems, each in their own way. DSSS Direct Sequence Spread Spectrum OFDM Orthogonal Frequency Division Multiplexing FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum The result is a string of chips. In DSSS individual pulses are increased to a much higher frequency by multiplying them with a code that is unique to each WLAN. All the stations know the code. 6

7 DSSS Direct Sequence Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS has good interference rejection. 7

8 OFDM Orthogonal Frequency Division Multiplexing Direct signal. Original reflected signal. Longer reflected signal. In OFDM, the reverse happens. 10 (say) serial bits are converted into 10 parallel bits, each of which modulates its own radio carrier. Each carrier is now carrying a bit rate that is 1/10 th the bit rate of the original. A reflected signal path needs to be 10 times longer to cause the same interference. Longer paths are more attenuated so the strength of the interference is also less. Wireless NICs 8

9 Access Point (AP) Usually connects wireless and wired networks if not wired acts as an extension point (wireless bridge) consists of a radio, a wired network interface (e.g., 802.3), and bridging software conforming to the 802.1d bridging standard Number of clients supported device dependent AP as a Wireless Bridge mobile terminal server fixed terminal infrastructure network access point application TCP IP LLC MAC PHY LLC MAC MAC PHY PHY Application TCP IP LLC MAC PHY 9

10 Basic Service Set (BSS) Coordinated function BSS Independent Basic Service Set (IBSS) A BSS without Access Point IBSS An ad hoc network 10

11 Extended Service Set (ESS) ESS: one or more BSSs interconnected by a Distribution System (DS) Traffic always flows via Access Point allows clients to seamlessly roam between APs Distributed System (DS) A thin layer in each AP embodied as part of the bridge function keeps track of AP-MN associations delivers frames between APs Three types: Integrated: A single AP in a standalone network Wired: Using cable to interconnect the Access- Points Wireless: Using wireless to interconnect the Access-Points 11

12 ESS: Single BSS (with integrated DS) A cell Access Point to meters BSS ESS: BSS s with Wired Distribution System (DS) 20-30% overlap BSS Distribution System BSS 12

13 ESS: BSS s with Wireless Distribution System (DS) BSS Distribution System BSS SSID (Service Set Identifier) Service set ID used in an ESS or IBSS An IBSS with no APs uses the Basic Service Set Identification (BSSID) The BSSID field is a 48-bit field of the same format as an IEEE 802 MAC address In an infrastructure wireless network that includes an AP, the Extended Service Set Identification (ESSID) is used ESSID is the identifying name of an wireless network 13

14 ESSID in an ESS ESSID differentiates one WLAN from another Client must be configured with the right ESSID to be able to associate itself with a specific AP ESSID is not designed to be part of security mechanism, and it is unfitted to be one AP broadcast the SSID(s) they support Client association requests contain the ESSID Transmitted in the clear Connecting to the Network Client Access Point Probe Request Probe Response Probing Authentication Request Authentication Response Association Request Association Response Authentication Association 14

15 Probing Phase Find an available AP APs may operate at different channels (11 channels in total in case of a) Should scan a channel at least MinChannelTime If an AP is found, should last MaxChannelTime Active Scanning MN AP probe request with SSID probe response If SSID matches Service Set Identifier (SSID) 15

16 Passive Scanning MN beacon with SSID AP Service Set Identifier (SSID) Full Scanning MN AP 1 AP 2 AP 3 Scan channel 1 Scan channel 2 Beacon or Probe Resp MinChannelTime MaxChannelTime Scan channel 3 Scan channel 11 16

17 Association & Re-association Association: The mapping between some AP s port and an MN Association must exist before network services can be used Wireless LAN Association replaces the physical link in a wired LAN MN may later re-associate to another AP with higher signal quality Authentication and Association Unauthenticated and unassociated The node is disconnected from the network and not associated to an access point. Authenticat ion Authenticated and unassociated The node has been authenticated on the network but has not yet associated with the access point. Authenticated and associated The node is connected to the network and able to transmit and receive data through the access point. 17

18 Authentication Methods Open Authentication (standard) Shared key authentication (standard) MAC Address authentication (commonly used) Open Authentication The authentication request contain a NULL authentication protocol. It must have the AP SSID. The access point will grant any request for authentication Client Access Point Authentication Request Authentication response 18

19 Shared Key Authentication Requires that the client configures a static WEP key Client Access Point Authentication Request Authentication response (challenge) Authentication Request(encrypted challenge) Authentication response(success/failure) MAC Address Authentication Not specified in the standard, but supported by many vendors (e.g. Cisco) Can be added to open and shared key authentication Client Access Point RADIUS Server Auth. Request Auth. Response (Success/Reject) Access-Request (MAC sent as RADIUS req.) Access-Success/Reject 19

20 WEP Encapsulation 1. P = M checksum(m) {p=plaintext} 2. KeyStream = RC4 (IV k) {k=shared-key} 3. C = XOR (P, KeyStream) {c=ciphertext} 4. Transmit (IV, C) {IV=init-vector} Initialization Vector (IV) WEP Key Plaintext seed CRC-32 RC4 PRNG Key Stream P Integrity Check Value (ICV) C IV Ciphertext Message WEP Decapsulation 1. KeyStream = RC4 (IV k) 2. P = XOR (C, KeyStream) = M checksum(m) 3. If checksum(m ) = (checksum(m)) Then P is accepted WEP Key IV Ciphertext Seed RC4 PRNG Key stream P Plaintext CRC 32 ICV M ICV ICV' = ICV? Message 20

21 WEP frame The IV sent with the ciphertext contains two fields: = IV & KeyID Unencrypted header IV KEY ID Payload ICV (FCS) Encrypted ICV is a CRC-32 checksum over the Payload (802 Header and the Data) WEP Key Management What is KeyID? Each entity in the wireless LAN (AP, clients) is configured with four static WEP keys KeyIDs 0,1,2,3 The keys are shared by an AP and all the wireless stations accessing it The ID of the key used for encryption/decryption appears in the packet WEP header 21

22 RC4 key IV (3 octets) Secret Key (5 or 13 octets) Standard: = 64 bit RC4 key Vendors: = 128 bit RC4 key We ll see that key-size doesn t prevent the attacks Details - Checksum CRC-32 - detecting single random bit errors If CRC is correct, WEP assumes Packet has not been modified Packet is from authorized user Linear Property: CRC (XOR(A,B)) = XOR(CRC (A), CRC(B)) 22

23 RC4 Developed by Rivest in 1987 Kept as a trade secret (but leaked in 1994) Key can be between 1 and 256 bytes Used as a simple and fast generator of pseudorandom sequences of bytes (to be used as onetime-pad ) Should discard first 256 bytes of generated pad Passes all usual randomness tests Vulnerabilities RC 4 stream ciper not suited for data with lots of packet loss Loss of data requires re-synch, new key every time Poor key management WEP uses same key for authentication/encryption Provides no mechanism for session key refreshing one-way authentication: has no provision for MNs to authenticate/verify the integrality of AP 23

24 Weaknesses of WEP: Overall Key Space is Too Small IV change per packet is OPTIONAL If the IV key for RC4 is changed for every packet, repeated patterns can occur more frequently at the rate of 11 Mbps of 1,500 bytes/packet, all key space will be exhausted in about 5 hours X based on EAP (extensible authentication protocol, RFC 2284) still one-way authentication initially, MN is in an unauthorized port an authentication server exists after authorized, the MH enters an authorized port 802.1X ties it to the physical medium, be it Ethernet, Token Ring or wireless LAN. 24

25 Three Main Components supplicant: usually the client software authenticator: usually the access point authentication server: usually a Remote Authentication Dial-In User Service (RADIUS) server 802.1X How it works Client Let me in! (EAP Start) What s your ID? (EAP-request identity message) ID = [email protected] (EAP Response) AP Is [email protected] OK? Auth Server RADIUS The answer is 47 Prove to me that you are [email protected] EAP Challenge/ Authentication Come in. Here is the session key. Let him in. Here is the session key. network Encrypted session 25

26 Step 1 Initially, MN is in an unauthorized port only 802.1X traffic from MN is forwarded. Traffics such as Dynamic Host Configuration Protocol (DHCP), HTTP, FTP, SMTP and Post Office Protocol 3 (POP3) are all blocked. The client then sends an EAP-start message. Step 2 The AP will then reply with an EAP-request identity message to obtain the client's identity. The client's EAP-response packet containing the client's identity is forwarded to the authentication server. The authentication server is configured to authenticate clients with a specific authentication algorithm. The result is an accept or reject packet from the authentication server to the access point. 26

27 Steps 3 and 4 Upon receiving the accept packet, the AP will transit the client's port to an authorized state, then all traffic will be forwarded. Notes: 802.1X for wireless LANs makes NO mention of key distribution or management. This is left for vendor implementation. At logoff, the client will send an EAP-logoff message to force the AP to transit the client port to an unauthorized state Key Management Key Management: BKR (broadcast key rotation) AP periodically broadcasts WEP shared key The initial WEP key only used for registration at the first time. So the WEP key is used less frequently. TKIP (temporal key integrity protocol) hashing the key before using it for encrypting a packet 27

28 MAC Management Layer Synchronization Time Synchronization Function (TSF) Power Management Sleeping without missing any messages Power management functions Periodic sleeping, frame buffering, traffic indication map Association and reassociation Joining a network Roaming, moving from one AP to another Synchronization in All stations maintain a local timer Time Synchronization Function Keeps timers from all stations in sync Timing conveyed by periodic Beacon transmissions Beacon contains Timestamp for the entire BSS Timestamp from Beacons used to calibrate local clocks 28

29 Time Synchronization Function (TSF) Beacon 的 產 生 週 期 稱 為 Beacon Period 可 以 傳 送 Beacon 訊 息 的 時 間 點 稱 為 Target Beacon Transmission Times (TBTTs) 每 個 TBTT 間 隔 一 個 Beacon Period 的 時 間 Beacon transmission may be delayed by CSMA deferral Timestamp contains timer value at transmit time TSF in Ad Hoc Mode: Which One Generates the Beacon? 當 TBTT 時 間 點 到 時, 每 個 節 點 並 不 立 即 送 出 Beacon 訊 息, 而 是 等 待 t 時 槽 的 時 間 t 的 值 由 節 點 個 別 從 [0, w] 之 間 的 整 數 中 隨 機 選 出, 其 中 w 是 一 個 固 定 的 系 統 參 數, 稱 為 Beacon Contention Window Size 節 點 等 待 時 同 時 監 聽 網 路 上 的 訊 息 若 節 點 在 t 時 槽 時 間 內 未 聽 到 其 他 節 點 送 出 的 Beacon 訊 息, 則 在 t 時 槽 時 間 過 後 可 送 出 自 己 的 Beacon 訊 息 若 節 點 在 t 時 槽 時 間 內 聽 到 別 的 節 點 送 出 的 Beacon 訊 息, 則 取 消 傳 送, 改 為 接 收 此 訊 息 每 個 接 收 到 Beacon 訊 息 的 節 點 檢 視 其 中 的 時 間 戳 記 若 發 現 Beacon 訊 息 的 時 間 戳 記 晚 於 自 己 本 身 時 鐘 的 時 間, 則 將 自 己 的 時 鐘 調 整 成 時 間 戳 記 所 示 的 時 間 29

30 Power Management Power management is important to mobile devices that are battery powered. Current LAN protocol assumes stations are always ready to receive Idle receive state dominates LAN adaptor power consumption over time Power Management Protocol allows transceiver to be off as much as possible is transparent to existing protocols Power Management in Infrastructure Mode Allow idle stations to go to sleep Station s power save mode stored in AP APs buffer packets for sleeping stations AP announces which stations have frames buffered Traffic Indication Map (TIM) sent with every Beacon 30

31 Power Management in Infrastructure Mode (cont.) Power saving stations wake up periodically listen for Beacons If it has packets buffered, it then sends a power-save poll request frame to the AP AP will send the buffered frame to the station The station can sleep again Power Management in Ad Hoc Mode Similar to the infrastructure mode However, the buffering scheme is achieved by the sending station (as no AP here) Sleeping station also wakes up periodically to listen Beacon and ATIM If it has data buffered, sends an Ack and wakes up Sending station sends the data to the sleeping station 31

32 Distributed Coordination Function: CSMA/CA CSMA: Carrier Sense Multiple Access physical carrier sense: physical layer virtual carrier sense: MAC layer network allocation vector (NAV) CA: Collision Avoidance random backoff procedure shall be implemented in all stations and APs Carrier Sense: Carrier Presence B wants to send to C at this time A B C B senses carrier so it starts sending Data time 32

33 Carrier Sense: No Carrier Data B wants to send to C at this time A B C B senses no carrier so it defers sending Data B starts sending only after the medium is free time Hidden Terminal Problem B Data B s signal range A C wants to send to A at this time Data C B s a hidden terminal to C and vise versa collision C senses carrier so it starts sending time 33

34 ACK: Collision Detection B A Data 1 C Data 7 ACK 1 Data 2 Data 1 OK No ACK 7 Data 2 No ACK 2 CTS/RTS: Virtual Carrier d B B knows A is to receive C s data in d CTS(d) B won t send A any data in d RTS A C wants to send to A RTS(k) CTS(d) Data ACK C C knows A is ready to receive time 34

35 Problem With Persistent CSMA B B wants to send to A at this time B senses signal so it waits too A busy C wants to send to A at this time C senses A s signal so it waits C B starts sending as soon as it senses carrier collide C starts sending as soon as it senses carrier time Collision Avoidance: Random Backoff B A C When B senses carrier it starts a timer busy When C senses carrier it starts a timer Timer value is determined by random B senses signal at this time time 35

36 Contention Window random 1 data frame The winner busy contention window DIFS random 2 All stations must wait DIFS after medium is free random 3 time SIFS: Giving Priority to RTS/CTS/ACK Source data frame busy Destination DIFS contention window ACK Others SIFS SIFS Defer access DIFS 36

37 SIFS: Transmitting Fragments Source Fragment 1 SIFS Fragment 2 DIFS SIFS Destination SIFS ACK SIFS ACK Contention Window Others Defer access EIFS: Low Priority Retransmission Source data frame can resend busy Destination DIFS contention window EIFS DIFS No ACK Others SIFS SIFS Defer access contension 37

38 CSMA/CA with RTS/CTS Source RTS SIFS SIFS data frame busy Destination CTS ACK contention window Others SIFS NAV (RTS) SIFS DIFS NAV (CTS) RTS/CTS is Optional system parameter RTSThread RTS/CTS is used only when frame size RTSThread 38

39 Point Coordination Function An alternative access method Shall be implemented on top of the DCF A point coordinator (polling master) is used to determine which station currently has the right to transmit. Shall be built up from the DCF through the use of an access priority mechanism. Different accesses of traffic can be defined through the use of different values of IFS. Contention Free Period SIFS B D1+poll U1+ack Contention free Period (CFP) SIFS D2+ack +poll U2+ack SIFS D3+ack +poll PIFS D4+poll U4+ack SIFS CF+End PIFS SIFS SIFS SIFS SIFS<PIFS<DIFS NAV 39

40 Summary IEEE Wireless LAN Architecture IEEE Physical Layer DSSS Authentication: WEP, 802.1x IEEE MAC CSMA/CA PCF 40

Chapter 7 Low-Speed Wireless Local Area Networks

Chapter 7 Low-Speed Wireless Local Area Networks Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics

More information

802.11. Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak

802.11. Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak 802.11 Markku Renfors Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak Contents 802.11 Overview & Architecture 802.11 MAC 802.11 Overview and Architecture

More information

IEEE802.11 Wireless LAN

IEEE802.11 Wireless LAN IEEE802.11 The broadband wireless Internet Maximilian Riegel wlan-tutorial.ppt-1 (28.11.2000) WLAN Dream Finally Seems to Happen... Recently lots of serious WLAN activities have been announced Big players

More information

Lecture 17: 802.11 Wireless Networking"

Lecture 17: 802.11 Wireless Networking Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion

More information

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs) CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,

More information

Basic processes in IEEE802.11 networks

Basic processes in IEEE802.11 networks Module contents IEEE 802.11 Terminology IEEE 802.11 MAC Frames Basic processes in IEEE802.11 networks Configuration parameters.11 Architect. 1 IEEE 802.11 Terminology Station (STA) Architecture: Device

More information

Wiereless LAN 802.11

Wiereless LAN 802.11 Tomasz Kurzawa Wiereless LAN 802.11 Introduction The 802.11 Architecture Channels and Associations The 802.11 MAC Protocol The 802.11 Frame Introduction Wireless LANs are most important access networks

More information

CSMA/CA. Information Networks p. 1

CSMA/CA. Information Networks p. 1 Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not

More information

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006 CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)

More information

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,

More information

Security in IEEE 802.11 WLANs

Security in IEEE 802.11 WLANs Security in IEEE 802.11 WLANs 1 IEEE 802.11 Architecture Extended Service Set (ESS) Distribution System LAN Segment AP 3 AP 1 AP 2 MS MS Basic Service Set (BSS) Courtesy: Prashant Krishnamurthy, Univ Pittsburgh

More information

IEEE 802 Protocol Layers. IEEE 802.11 Wireless LAN Standard. Protocol Architecture. Protocol Architecture. Separation of LLC and MAC.

IEEE 802 Protocol Layers. IEEE 802.11 Wireless LAN Standard. Protocol Architecture. Protocol Architecture. Separation of LLC and MAC. IEEE 802.11 Wireless LAN Standard IEEE 802 Protocol Layers Chapter 14 Protocol Architecture Functions of physical layer: Encoding/decoding of signals Preamble generation/removal (for synchronization) Bit

More information

802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale

802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale 802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data-rate applications Ability to

More information

WiFi. Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman. WiFi 1

WiFi. Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman. WiFi 1 WiFi Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman WiFi 1 What is the goal of 802.11 standard? To develop a Medium Access Control (MAC) and Physical Layer (PHY) specification for wireless

More information

... neither PCF nor CA used in practice

... neither PCF nor CA used in practice IEEE 802.11 MAC CSMA/CA with exponential backoff almost like CSMA/CD drop CD CSMA with explicit ACK frame added optional feature: CA (collision avoidance) Two modes for MAC operation: Distributed coordination

More information

IEEE 802.11 WLAN (802.11) ...Copyright. Renato Lo Cigno www.disi.unitn.it/locigno/didattica/nc/

IEEE 802.11 WLAN (802.11) ...Copyright. Renato Lo Cigno www.disi.unitn.it/locigno/didattica/nc/ WLAN (802.11) Renato Lo Cigno www.disi.unitn.it/locigno/didattica/nc/...copyright Quest opera è protetta dalla licenza Creative Commons NoDerivs-NonCommercial. Per vedere una copia di questa licenza, consultare:

More information

How To Understand The Power Of A Network On A Microsoft Ipa 2.5 (Ipa) 2.2.2 (Ipam) 2-2.5-2 (Networking) 2 (Ipom) 2(2

How To Understand The Power Of A Network On A Microsoft Ipa 2.5 (Ipa) 2.2.2 (Ipam) 2-2.5-2 (Networking) 2 (Ipom) 2(2 Workshop Presentation Chapter4 Yosuke TANAKA Agenda(Framing in Detail) Data Frames Control Frames type RTS Duration CTS Addressing (!!important!!) Variation on Data Frame Theme Applied Data Framing ACK

More information

Lecture 7 Multiple Access Protocols and Wireless

Lecture 7 Multiple Access Protocols and Wireless Lecture 7 Multiple Access Protocols and Wireless Networks and Security Jacob Aae Mikkelsen IMADA November 11, 2013 November 11, 2013 1 / 57 Lecture 6 Review What is the responsibility of the link layer?

More information

Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN 2067 4074

Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN 2067 4074 Issues in WiFi Networks Nicolae TOMAI Faculty of Economic Informatics Department of IT&C Technologies Babes Bolyai Cluj-Napoca University, Romania [email protected] Abstract: The paper has four sections.

More information

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman 1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers

More information

IEEE 802.11 Technical Tutorial. Introduction. IEEE 802.11 Architecture

IEEE 802.11 Technical Tutorial. Introduction. IEEE 802.11 Architecture IEEE 802.11 Technical Tutorial Introduction The purpose of this document is to give technical readers a basic overview of the new 802.11 Standard, enabling them to understand the basic concepts, principle

More information

Lecture 6.1 Introduction. Giuseppe Bianchi, Ilenia Tinnirello

Lecture 6.1 Introduction. Giuseppe Bianchi, Ilenia Tinnirello PART 6 IEEE 802.11 Wireless LANs Lecture 6.1 Introduction WLAN History Ł Original goal: Deploy wireless Ethernet First generation proprietary solutions (end 80, begin 90) WaveLAN (AT&T)) HomeRF (Proxim)

More information

Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards

Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards White Paper Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards By Dr. Wen-Ping Ying, Director of Software Development, February 2002 Introduction Wireless LAN networking allows the

More information

IEEE 802.11 Wireless LAN Standard. Updated: 5/10/2011

IEEE 802.11 Wireless LAN Standard. Updated: 5/10/2011 IEEE 802.11 Wireless LAN Standard Updated: 5/10/2011 IEEE 802.11 History and Enhancements o 802.11 is dedicated to WLAN o The group started in 1990 o First standard that received industry support was 802.11b

More information

Chapter 2 Wireless Networking Basics

Chapter 2 Wireless Networking Basics Chapter 2 Wireless Networking Basics Wireless Networking Overview Some NETGEAR products conform to the Institute of Electrical and Electronics Engineers (IEEE) 802.11g standard for wireless LANs (WLANs).

More information

Wireless Local Area Networks and the 802.11 Standard

Wireless Local Area Networks and the 802.11 Standard Wireless Local Area Networks and the 802.11 Standard March 31, 2001 Plamen Nedeltchev, PhD Edited by Felicia Brych Table of Contents1 Introduction... 3 Upper Layer Protocols of OSI... 3 WLAN Architecture...

More information

10. Wireless Networks

10. Wireless Networks Computernetzwerke und Sicherheit (CS221) 10. Wireless Networks 1. April 2011 omas Meyer Departement Mathematik und Informatik, Universität Basel Chapter 6 Wireless and Mobile Networks (with changes CS221

More information

Wireless LAN Security Mechanisms

Wireless LAN Security Mechanisms Wireless LAN Security Mechanisms Jingan Xu, Andreas Mitschele-Thiel Technical University of Ilmenau, Integrated Hard- and Software Systems Group [email protected], [email protected] Abstract.

More information

WI-FI TECHNOLOGY: SECURITY ISSUES

WI-FI TECHNOLOGY: SECURITY ISSUES RIVIER ACADEMIC JOURNAL, VOLUME 2, NUMBER 2, FALL 2006 WI-FI TECHNOLOGY: SECURITY ISSUES Vandana Wekhande* Graduate student, M.S. in Computer Science Program, Rivier College Keywords: Wireless Internet,802.11b,

More information

Wireless security. Any station within range of the RF receives data Two security mechanism

Wireless security. Any station within range of the RF receives data Two security mechanism 802.11 Security Wireless security Any station within range of the RF receives data Two security mechanism A means to decide who or what can use a WLAN authentication A means to provide privacy for the

More information

802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi [email protected]

802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi Giulio.Rossetti@gmail.com 802.11 Security (WEP, WPA\WPA2) 19/05/2009 Giulio Rossetti Unipi [email protected] 802.11 Security Standard: WEP Wired Equivalent Privacy The packets are encrypted, before sent, with a Secret Key

More information

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or

More information

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set

More information

WildPackets Guide to Wireless LAN Analysis

WildPackets Guide to Wireless LAN Analysis WildPackets Guide to Wireless LAN Analysis Executive Summary The market for wireless communications has grown rapidly since the introduction of 802.11 wireless local area networking (WLAN) standards. Business

More information

Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2002): 15 Wireless LAN Security 1 Dr.-Ing G.

Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2002): 15 Wireless LAN Security 1 Dr.-Ing G. Network Security Chapter 15 Security of Wireless Local Area Networks Network Security WS 2002: 15 Wireless LAN Security 1 IEEE 802.11 IEEE 802.11 standardizes medium access control MAC and physical characteristics

More information

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers EECS 122: Introduction to Computer Networks Multiaccess Protocols Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776

More information

IEEE 802.11e WLANs / WMM. S.Rajesh ([email protected]) AU-KBC Research Centre, BroVis Wireless Networks, smartbridges Pte Ltd.

IEEE 802.11e WLANs / WMM. S.Rajesh (rajeshsweb@gmail.com) AU-KBC Research Centre, BroVis Wireless Networks, smartbridges Pte Ltd. IEEE 802.11e WLANs / WMM S.Rajesh ([email protected]) AU-KBC Research Centre, BroVis Wireless Networks, smartbridges Pte Ltd. Outline A short review of 802.11 MAC Drawbacks of 802.11 MAC Application

More information

A Technical Tutorial on the IEEE 802.11 Protocol

A Technical Tutorial on the IEEE 802.11 Protocol A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner Director of Engineering copyright BreezeCOM 1997 Introduction The purpose of this document is to give technical readers a basic overview

More information

White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points. http://www.veryxtech.com

White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points. http://www.veryxtech.com White paper Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points http://www.veryxtech.com White Paper Abstract Background The vulnerabilities spotted in the Wired Equivalent Privacy (WEP) algorithm

More information

COMP 3331/9331: Computer Networks and Applications

COMP 3331/9331: Computer Networks and Applications COMP 3331/9331: Computer Networks and Applications Week 10 Wireless Networks Reading Guide: Chapter 6: 6.1 6.3 Wireless Networks + Security 1 Wireless and Mobile Networks Background: # wireless (mobile)

More information

ECE 428 Computer Networks and Security

ECE 428 Computer Networks and Security ECE 428 Computer Networks and Security 1 Instructor: Sagar Naik About the Instructor Office: EIT 4174, ECE Dept. Other courses that I teach ECE 355: Software Engineering ECE 453/CS 447/ SE 465: Software

More information

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions

More information

The Wireless Network Road Trip

The Wireless Network Road Trip The Wireless Network Road Trip The Association Process To begin, you need a network. This lecture uses the common logical topology seen in Figure 9-1. As you can see, multiple wireless clients are in

More information

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN: WLAN: Wireless LAN Make use of a wireless transmission medium Tipically restricted in their diameter: buildings, campus, single room etc.. The global goal is to replace office cabling and to introduce

More information

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when

More information

How To Analyze The Security On An Ipa Wireless Sensor Network

How To Analyze The Security On An Ipa Wireless Sensor Network Throughput Analysis of WEP Security in Ad Hoc Sensor Networks Mohammad Saleh and Iyad Al Khatib iitc Stockholm, Sweden {mohsaleh, iyad}@iitc.se ABSTRACT This paper presents a performance investigation

More information

LP-348. LP-Yagy2415. LP-510G/550G 54M Wireless Adapter PCMCIA/PCI. User Guide Ver:2.0 LP-5420G WWW.LANPRO.COM

LP-348. LP-Yagy2415. LP-510G/550G 54M Wireless Adapter PCMCIA/PCI. User Guide Ver:2.0 LP-5420G WWW.LANPRO.COM LP-348 LP-Yagy2415 LP-1518 LP-5P LP-510G/550G 54M Wireless Adapter PCMCIA/PCI User Guide Ver:2.0 LP-5420G WWW.LANPRO.COM COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. is a

More information

802.11 Wireless LAN Protocol CS 571 Fall 2006. 2006 Kenneth L. Calvert All rights reserved

802.11 Wireless LAN Protocol CS 571 Fall 2006. 2006 Kenneth L. Calvert All rights reserved 802.11 Wireless LAN Protocol CS 571 Fall 2006 2006 Kenneth L. Calvert All rights reserved Wireless Channel Considerations Stations may move Changing propagation delays, signal strengths, etc. "Non-transitive"

More information

Medium Access Control (MAC) and Wireless LANs

Medium Access Control (MAC) and Wireless LANs Medium Access Control (MAC) and Wireless LANs Outline Wireless LAN Technology Medium Access Control for Wireless IEEE 802.11 Wireless LAN Applications LAN Extension Cross-building interconnect Nomadic

More information

An Investigation of the Impact of Signal Strength on Wi-Fi Link Throughput through Propagation Measurement. Eric Cheng-Chung LO

An Investigation of the Impact of Signal Strength on Wi-Fi Link Throughput through Propagation Measurement. Eric Cheng-Chung LO An Investigation of the Impact of Signal Strength on Wi-Fi Link Throughput through Propagation Measurement Eric Cheng-Chung LO A dissertation submitted to Auckland University of Technology in partial fulfillment

More information

Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace

Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace Lab Exercise 802.11 Objective To explore the physical layer, link layer, and management functions of 802.11. It is widely used to wireless connect mobile devices to the Internet, and covered in 4.4 of

More information

EPL 657 Wireless Networks

EPL 657 Wireless Networks EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing

More information

Video Transmission over Wireless LAN. Hang Liu [email protected]

Video Transmission over Wireless LAN. Hang Liu Hang.liu@thomson.net Video Transmission over Wireless LAN Hang Liu [email protected] Page 1 Introduction! Introduction! Wi-Fi Multimedia and IEEE 802.11e for QoS Enhancement! Error Control Techniques Page 2 Introduction!

More information

Overview of 802.11 Networks and Standards

Overview of 802.11 Networks and Standards Overview of 802.11 Networks and Standards Mauri Kangas, Helsinki University of Technology, 17.02.2004 Mauri Kangas 17.2.2004 Page 1 (34) Family of 802.xx Standards ISO/IEC 8802-xx = IEEE 802.xx IEEE 802.1

More information

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected]

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 ageyer@tunitas.com Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected] Ground Setting Three Basics Availability Authenticity Confidentiality Challenge

More information

TL-WN310G 54M Wireless CardBus Adapter

TL-WN310G 54M Wireless CardBus Adapter 54M Wireless CardBus Adapter Rev: 1.0.1 1910010042 COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. is a registered trademark of TP-LINK TECHNOLOGIES CO., LTD. Other brands and

More information

Your 802.11 Wireless Network has No Clothes

Your 802.11 Wireless Network has No Clothes Your 802.11 Wireless Network has No Clothes William A. Arbaugh Narendar Shankar Y.C. Justin Wan Department of Computer Science University of Maryland College Park, Maryland 20742 March 30, 2001 Abstract

More information

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos [email protected] 2-2009

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl 2-2009 Unit of Learning # 2 The Physical Layer Sergio Guíñez Molinos [email protected] 2-2009 Local Area Network (LAN) Redes de Computadores 2 Historic topologies more used in LAN Ethernet Logical Bus and Physical

More information

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh, Ph.D. [email protected] Mesh 2008, Cap Esterel, France 1 Abstract Abundant hidden node collisions and correlated channel access

More information

The next generation of knowledge and expertise Wireless Security Basics

The next generation of knowledge and expertise Wireless Security Basics The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com

More information

IEEE 802.11 frame format

IEEE 802.11 frame format IEEE 802.11 frame format Pietro Nicoletti www.studioreti.it 802-11-Frame - 1 P. Nicoletti: see note pag. 2 Copyright note These slides are protected by copyright and international treaties. The title and

More information

Chapter 6: Wireless and Mobile Networks

Chapter 6: Wireless and Mobile Networks Chapter 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime

More information

Wireless LAN Pen-Testing. Part I

Wireless LAN Pen-Testing. Part I Wireless LAN Pen-Testing Part I To know your Enemy, you must become your Enemy (Sun Tzu, 600 BC) Georg Penn 23.03.2012 Motivation Read manuals, documentation, standards Check sources for their reliability,

More information

Based on Computer Networking, 4 th Edition by Kurose and Ross

Based on Computer Networking, 4 th Edition by Kurose and Ross Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,

More information

Wireless Personal Area Networks (WPANs)

Wireless Personal Area Networks (WPANs) Wireless Personal Area Networks (WPANs) Bluetooth, ZigBee Contents Introduction to the IEEE 802 specification family Concept of ISM frequency band Comparison between different wireless technologies ( and

More information

Wireless LAN Services for Hot-Spot

Wireless LAN Services for Hot-Spot Wireless LAN Services for Hot-Spot Woo-Yong Choi Electronics and Telecommunications Research Institute [email protected] ETRI Contents Overview Wireless LAN Services Current IEEE 802.11 MAC Protocol

More information

Philippe Klein. avb-phkl-802-11-qos-overview-0811-1

Philippe Klein. avb-phkl-802-11-qos-overview-0811-1 802.11 QoS Overview Philippe Klein IEEE Plenary Meeting Nov 08 Dallas, TX avb-phkl-802-11-qos-overview-0811-1 Disclaimer This presentation is not a highly detailed technical presentation but a crash course

More information

The Basics of Wireless Local Area Networks

The Basics of Wireless Local Area Networks The Basics of Wireless Local Area Networks Andreas Johnsen Student at Mälardalens högskola [email protected] +46 712345678 ABSTRACT This paper is written as a brief education about the basics of

More information

Efficient MAC Protocol for Heterogeneous Cellular Networks (HC-MAC)

Efficient MAC Protocol for Heterogeneous Cellular Networks (HC-MAC) Vol.2, Issue.2, Mar-Apr 2012 pp-078-083 ISSN: 2249-6645 Efficient MAC Protocol for Heterogeneous Cellular Networks (HC-MAC) 1 Y V Adi Satyanarayana, 2 Dr. K Padma Raju 1 Y V Adi Satyanarayana, Assoc. Professor,

More information

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,

More information

A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11

A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11 A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11 Christian Röhl, Hagen Woesner, Adam Wolisz * Technical University Berlin Telecommunication Networks Group {roehl,

More information

Wireless LAN Access Point. IEEE 802.11g 54Mbps. User s Manual

Wireless LAN Access Point. IEEE 802.11g 54Mbps. User s Manual Wireless LAN Access Point IEEE 802.11g 54Mbps User s Manual Table of Contents Chapter 1 Introduction... 1 1.1 Package Contents...2 1.2 Features...2 1.3 Specifications...2 1.4 Physical Description...3 Chapter

More information

Ph.D. Thesis. Resources optimization in multimedia communications. Luca Sanna Randaccio. Advisor: Prof. Luigi Atzori

Ph.D. Thesis. Resources optimization in multimedia communications. Luca Sanna Randaccio. Advisor: Prof. Luigi Atzori Ph.D. Thesis Resources optimization in multimedia communications Luca Sanna Randaccio Advisor: Prof. Luigi Atzori University of Cagliari Department of Electrical and Electronic Engineering Table of Contents

More information

Wireless LAN Concepts

Wireless LAN Concepts Wireless LAN Concepts Wireless LAN technology is becoming increasingly popular for a wide variety of applications. After evaluating the technology, most users are convinced of its reliability, satisfied

More information

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch

More information

EETS 8316 Wireless Networks Fall 2013

EETS 8316 Wireless Networks Fall 2013 EETS 8316 Wireless Networks Fall 2013 Lecture: WiFi Discovery, Powersave, and Beaconing http://lyle.smu.edu/~skangude/eets8316.html Shantanu Kangude [email protected] Discovery and Beaconing Discovery?

More information

Chapter 6 CDMA/802.11i

Chapter 6 CDMA/802.11i Chapter 6 CDMA/802.11i IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Some material copyright 1996-2012 J.F Kurose and K.W. Ross,

More information

EPI-3601S Wireless LAN PCI adapter Version 1.2 EPI-3601S. Wireless LAN PCI Adapter. (802.11g & 802.11b up to 108 Mbps) User Manual. Version: 1.

EPI-3601S Wireless LAN PCI adapter Version 1.2 EPI-3601S. Wireless LAN PCI Adapter. (802.11g & 802.11b up to 108 Mbps) User Manual. Version: 1. EPI-3601S Wireless LAN PCI Adapter (802.11g & 802.11b up to 108 Mbps) User Manual Version: 1.2 1 TABLE OF CONTENTS 1 INTRODUCTION...3 2 FEATURES...3 3 PACKAGE CONTENTS...4 4 SYSTEM REQUIREMENTS...5 5 INSTALLATION...5

More information

White Paper. D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. E-mail: [email protected]; Web: http://www.dlink-intl.

White Paper. D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. E-mail: info@dlink.com.sg; Web: http://www.dlink-intl. Introduction to Voice over Wireless LAN (VoWLAN) White Paper D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. Introduction Voice over Wireless LAN (VoWLAN) is a technology involving the use

More information

Wireless Networking Basics. NETGEAR, Inc. 4500 Great America Parkway Santa Clara, CA 95054 USA

Wireless Networking Basics. NETGEAR, Inc. 4500 Great America Parkway Santa Clara, CA 95054 USA Wireless Networking Basics NETGEAR, Inc. 4500 Great America Parkway Santa Clara, CA 95054 USA n/a October 2005 2005 by NETGEAR, Inc. All rights reserved. Trademarks NETGEAR and Auto Uplink are trademarks

More information

ECE/CS 372 introduction to computer networks. Lecture 13

ECE/CS 372 introduction to computer networks. Lecture 13 ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:

More information

Introduction Chapter 1. Uses of Computer Networks

Introduction Chapter 1. Uses of Computer Networks Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks

More information

VoIP in 802.11. Mika Nupponen. S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1

VoIP in 802.11. Mika Nupponen. S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1 VoIP in 802.11 Mika Nupponen S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1 Contents Introduction VoIP & WLAN Admission Control for VoIP Traffic in WLAN Voice services in IEEE 802.11

More information

HIGH POWER WIRELESS N MINI USB ADAPTER K-300MWUN USER S MANUAL

HIGH POWER WIRELESS N MINI USB ADAPTER K-300MWUN USER S MANUAL HIGH POWER WIRELESS N MINI USB ADAPTER K-300MWUN USER S MANUAL Introduction Thank you for your purchase of the Kozumi K-300MWUN High Power Wireless N Mini USB Adapter. Featuring wireless technology, this

More information

Post-Class Quiz: Telecommunication & Network Security Domain

Post-Class Quiz: Telecommunication & Network Security Domain 1. What type of network is more likely to include Frame Relay, Switched Multi-megabit Data Services (SMDS), and X.25? A. Local area network (LAN) B. Wide area network (WAN) C. Intranet D. Internet 2. Which

More information

Networking: Certified Wireless Network Administrator Wi Fi Engineering CWNA

Networking: Certified Wireless Network Administrator Wi Fi Engineering CWNA coursemonster.com/uk Networking: Certified Wireless Network Administrator Wi Fi Engineering CWNA View training dates» Overview This new market-leading course from us delivers the best in Wireless LAN training,

More information

LTE, WLAN, BLUETOOTHB

LTE, WLAN, BLUETOOTHB LTE, WLAN, BLUETOOTHB AND Aditya K. Jagannatham FUTURE Indian Institute of Technology Kanpur Commonwealth of Learning Vancouver 4G LTE LTE (Long Term Evolution) is the 4G wireless cellular standard developed

More information

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins

More information

Getting Started with HP Wireless Networks. Version 10.41

Getting Started with HP Wireless Networks. Version 10.41 Getting Started with HP Wireless Networks Version 10.41 Copyright 2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties

More information

CSE 123A Computer Networks

CSE 123A Computer Networks CSE 123A Computer Networks Winter 2005 Lecture 5: Data-Link II: Media Access Some portions courtesy Srini Seshan or David Wetherall Last Time Framing: How to translate a bitstream into separate packets

More information

Wireless Security. New Standards for 802.11 Encryption and Authentication. Ann Geyer 209-754-9130 [email protected] www.tunitas.

Wireless Security. New Standards for 802.11 Encryption and Authentication. Ann Geyer 209-754-9130 ageyer@tunitas.com www.tunitas. Wireless Security New Standards for 802.11 Encryption and Authentication Ann Geyer 209-754-9130 [email protected] www.tunitas.com National Conference on m-health and EOE Minneapolis, MN Sept 9, 2003 Key

More information

Wi-Fi Why Now? Exploring New Wireless Technologies for Industrial Applications

Wi-Fi Why Now? Exploring New Wireless Technologies for Industrial Applications Wi-Fi Why Now? Exploring New Wireless Technologies for Industrial Applications Patrick McCurdy Product Marketing Manager Phoenix Contact Inc. [email protected] Ira Sharp Product Specialist Phoenix

More information

IEEE 802.11 WIRELESS LAN STANDARD

IEEE 802.11 WIRELESS LAN STANDARD CHAPTER14 IEEE 802.11 WIRELESS LAN STANDARD 14.1 IEEE 802 Architecture Protocol Architecture MAC Frame Format Logical Link Control 14.2 IEEE 802.11 Architecture and Services IEEE 802.11 Architecture IEEE

More information