Introduction to IEEE Wireless LAN
|
|
|
- Rosalyn Hampton
- 10 years ago
- Views:
Transcription
1 Introduction to IEEE Wireless LAN Li-Hsing Yen Chung Hua University Fall 2006 Difference Between Wired and Wireless LANs The medium impacts the design stations are mobile different MAC 1
2 Medium Impacts shared medium. unprotected from outside signals. significantly less reliable than wired PHYs. dynamic topologies Mobile Vs. Wireless Mobile moved from location to location, but is only used while at a fixed location Wireless access the LAN while in motion 2
3 IEEE 802 Committees SEC High Level Interface (HILI) Logical Link Control (LLC) CSMA/CD Working Group Token Bus Token Ring Metropolitan Area Network (MAN) BroadBand Technical Adv. Group (BBTAG) Fiber Optics Technical Adv. Group (FOTAG) Integrated Services LAN (ISLAN) Standard for Interoperable LAN Security (SILS) Wireless LAN (WLAN) Demand Priority Cable-TV Based Broadband Communication Network Wireless Personal Area Network (WPAN) Broadband Wireless Access (BBWA) RPRSG Resilient Packet Ring Study Group (RPRSG) IEEE IEEE a IEEE b WiFi IEEE g IEEE Bluetooth IEEE e IEEE f IEEE h IEEE i Security 2004 IEEE TG2 IEEE TG3 IEEE TG Specifications One MAC specification CSMA/CA Three Physical specification Radio Frequency hopping spread spectrum (FHSS) Direct sequence spread spectrum (DSSS) Infrared Red 3
4 IEEE Family IEEE b 2.45 GHz / 11 Mbps (300m range) IEEE a 5.8 GHz / 54 Mbps IEEE g 2.4 GHz / 54 Mbps 2.4 GHz Radio Licenses NOT required in these bands 5 GHz Direct Sequence Spread Spectrum IEEE IEEE a IEEE b IEEE g Standard for WLAN operations at data rates up to 2 Mbps in the 2.4 GHz ISM band. DSSS modulation. Standard for WLAN operations at data rates up to 54 Mbps in the 5 GHz band. Proprietary rate doubling" has achieved 108 Mbps. Realistic rating is Mbps. Wi-Fi or high-speed wireless 1, 2, 5.5 and 11 Mbps in the 2.4 GHz band. All b systems are backward compliant. Realistic rating is 2 to 4 Mbps a backward compatible to the b 2.4 GHz band using OFDM. Orthogonal Frequency Division Multiplexing 4
5 Standard a b g Bluetooth Data Rate 2Mbps 2.4GHz 54Mbps 5GHz 11Mbps 2.4GHz 54Mbps 2.4GHz Up to 2Mbps 2.45GHz Modulation Scheme FHSS or DSSS OFDM DSSS with CCK OFDM > 20Mbps DSSS + CCK < 20Mbps FHSS Pros/Cons This specification has been extended into b. "Wi-Fi Certified." 8 available channels. Less potential for RF interference than b and g. Better than b at supporting multimedia voice, video and largeimage applications in densely populated user environments. Relatively shorter range than b. Not interoperable with b. "Wi-Fi Certified." 14 channels available. Not interoperable with a. Requires fewer access points than a for coverage of large areas. High-speed access to data at up to 300 feet from base station. "Wi-Fi Certified." 14 channels available. May replace b. Improved security enhancements over Compatible with b. No native support for IP, so it does not support TCP/IP and wireless LAN applications well. Best suited for connecting PDAs, cell phones and PCs in short intervals. Adaptive 5
6 Spread Spectrum modulation schemes ease address problems, each in their own way. DSSS Direct Sequence Spread Spectrum OFDM Orthogonal Frequency Division Multiplexing FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum The result is a string of chips. In DSSS individual pulses are increased to a much higher frequency by multiplying them with a code that is unique to each WLAN. All the stations know the code. 6
7 DSSS Direct Sequence Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS has good interference rejection. 7
8 OFDM Orthogonal Frequency Division Multiplexing Direct signal. Original reflected signal. Longer reflected signal. In OFDM, the reverse happens. 10 (say) serial bits are converted into 10 parallel bits, each of which modulates its own radio carrier. Each carrier is now carrying a bit rate that is 1/10 th the bit rate of the original. A reflected signal path needs to be 10 times longer to cause the same interference. Longer paths are more attenuated so the strength of the interference is also less. Wireless NICs 8
9 Access Point (AP) Usually connects wireless and wired networks if not wired acts as an extension point (wireless bridge) consists of a radio, a wired network interface (e.g., 802.3), and bridging software conforming to the 802.1d bridging standard Number of clients supported device dependent AP as a Wireless Bridge mobile terminal server fixed terminal infrastructure network access point application TCP IP LLC MAC PHY LLC MAC MAC PHY PHY Application TCP IP LLC MAC PHY 9
10 Basic Service Set (BSS) Coordinated function BSS Independent Basic Service Set (IBSS) A BSS without Access Point IBSS An ad hoc network 10
11 Extended Service Set (ESS) ESS: one or more BSSs interconnected by a Distribution System (DS) Traffic always flows via Access Point allows clients to seamlessly roam between APs Distributed System (DS) A thin layer in each AP embodied as part of the bridge function keeps track of AP-MN associations delivers frames between APs Three types: Integrated: A single AP in a standalone network Wired: Using cable to interconnect the Access- Points Wireless: Using wireless to interconnect the Access-Points 11
12 ESS: Single BSS (with integrated DS) A cell Access Point to meters BSS ESS: BSS s with Wired Distribution System (DS) 20-30% overlap BSS Distribution System BSS 12
13 ESS: BSS s with Wireless Distribution System (DS) BSS Distribution System BSS SSID (Service Set Identifier) Service set ID used in an ESS or IBSS An IBSS with no APs uses the Basic Service Set Identification (BSSID) The BSSID field is a 48-bit field of the same format as an IEEE 802 MAC address In an infrastructure wireless network that includes an AP, the Extended Service Set Identification (ESSID) is used ESSID is the identifying name of an wireless network 13
14 ESSID in an ESS ESSID differentiates one WLAN from another Client must be configured with the right ESSID to be able to associate itself with a specific AP ESSID is not designed to be part of security mechanism, and it is unfitted to be one AP broadcast the SSID(s) they support Client association requests contain the ESSID Transmitted in the clear Connecting to the Network Client Access Point Probe Request Probe Response Probing Authentication Request Authentication Response Association Request Association Response Authentication Association 14
15 Probing Phase Find an available AP APs may operate at different channels (11 channels in total in case of a) Should scan a channel at least MinChannelTime If an AP is found, should last MaxChannelTime Active Scanning MN AP probe request with SSID probe response If SSID matches Service Set Identifier (SSID) 15
16 Passive Scanning MN beacon with SSID AP Service Set Identifier (SSID) Full Scanning MN AP 1 AP 2 AP 3 Scan channel 1 Scan channel 2 Beacon or Probe Resp MinChannelTime MaxChannelTime Scan channel 3 Scan channel 11 16
17 Association & Re-association Association: The mapping between some AP s port and an MN Association must exist before network services can be used Wireless LAN Association replaces the physical link in a wired LAN MN may later re-associate to another AP with higher signal quality Authentication and Association Unauthenticated and unassociated The node is disconnected from the network and not associated to an access point. Authenticat ion Authenticated and unassociated The node has been authenticated on the network but has not yet associated with the access point. Authenticated and associated The node is connected to the network and able to transmit and receive data through the access point. 17
18 Authentication Methods Open Authentication (standard) Shared key authentication (standard) MAC Address authentication (commonly used) Open Authentication The authentication request contain a NULL authentication protocol. It must have the AP SSID. The access point will grant any request for authentication Client Access Point Authentication Request Authentication response 18
19 Shared Key Authentication Requires that the client configures a static WEP key Client Access Point Authentication Request Authentication response (challenge) Authentication Request(encrypted challenge) Authentication response(success/failure) MAC Address Authentication Not specified in the standard, but supported by many vendors (e.g. Cisco) Can be added to open and shared key authentication Client Access Point RADIUS Server Auth. Request Auth. Response (Success/Reject) Access-Request (MAC sent as RADIUS req.) Access-Success/Reject 19
20 WEP Encapsulation 1. P = M checksum(m) {p=plaintext} 2. KeyStream = RC4 (IV k) {k=shared-key} 3. C = XOR (P, KeyStream) {c=ciphertext} 4. Transmit (IV, C) {IV=init-vector} Initialization Vector (IV) WEP Key Plaintext seed CRC-32 RC4 PRNG Key Stream P Integrity Check Value (ICV) C IV Ciphertext Message WEP Decapsulation 1. KeyStream = RC4 (IV k) 2. P = XOR (C, KeyStream) = M checksum(m) 3. If checksum(m ) = (checksum(m)) Then P is accepted WEP Key IV Ciphertext Seed RC4 PRNG Key stream P Plaintext CRC 32 ICV M ICV ICV' = ICV? Message 20
21 WEP frame The IV sent with the ciphertext contains two fields: = IV & KeyID Unencrypted header IV KEY ID Payload ICV (FCS) Encrypted ICV is a CRC-32 checksum over the Payload (802 Header and the Data) WEP Key Management What is KeyID? Each entity in the wireless LAN (AP, clients) is configured with four static WEP keys KeyIDs 0,1,2,3 The keys are shared by an AP and all the wireless stations accessing it The ID of the key used for encryption/decryption appears in the packet WEP header 21
22 RC4 key IV (3 octets) Secret Key (5 or 13 octets) Standard: = 64 bit RC4 key Vendors: = 128 bit RC4 key We ll see that key-size doesn t prevent the attacks Details - Checksum CRC-32 - detecting single random bit errors If CRC is correct, WEP assumes Packet has not been modified Packet is from authorized user Linear Property: CRC (XOR(A,B)) = XOR(CRC (A), CRC(B)) 22
23 RC4 Developed by Rivest in 1987 Kept as a trade secret (but leaked in 1994) Key can be between 1 and 256 bytes Used as a simple and fast generator of pseudorandom sequences of bytes (to be used as onetime-pad ) Should discard first 256 bytes of generated pad Passes all usual randomness tests Vulnerabilities RC 4 stream ciper not suited for data with lots of packet loss Loss of data requires re-synch, new key every time Poor key management WEP uses same key for authentication/encryption Provides no mechanism for session key refreshing one-way authentication: has no provision for MNs to authenticate/verify the integrality of AP 23
24 Weaknesses of WEP: Overall Key Space is Too Small IV change per packet is OPTIONAL If the IV key for RC4 is changed for every packet, repeated patterns can occur more frequently at the rate of 11 Mbps of 1,500 bytes/packet, all key space will be exhausted in about 5 hours X based on EAP (extensible authentication protocol, RFC 2284) still one-way authentication initially, MN is in an unauthorized port an authentication server exists after authorized, the MH enters an authorized port 802.1X ties it to the physical medium, be it Ethernet, Token Ring or wireless LAN. 24
25 Three Main Components supplicant: usually the client software authenticator: usually the access point authentication server: usually a Remote Authentication Dial-In User Service (RADIUS) server 802.1X How it works Client Let me in! (EAP Start) What s your ID? (EAP-request identity message) ID = [email protected] (EAP Response) AP Is [email protected] OK? Auth Server RADIUS The answer is 47 Prove to me that you are [email protected] EAP Challenge/ Authentication Come in. Here is the session key. Let him in. Here is the session key. network Encrypted session 25
26 Step 1 Initially, MN is in an unauthorized port only 802.1X traffic from MN is forwarded. Traffics such as Dynamic Host Configuration Protocol (DHCP), HTTP, FTP, SMTP and Post Office Protocol 3 (POP3) are all blocked. The client then sends an EAP-start message. Step 2 The AP will then reply with an EAP-request identity message to obtain the client's identity. The client's EAP-response packet containing the client's identity is forwarded to the authentication server. The authentication server is configured to authenticate clients with a specific authentication algorithm. The result is an accept or reject packet from the authentication server to the access point. 26
27 Steps 3 and 4 Upon receiving the accept packet, the AP will transit the client's port to an authorized state, then all traffic will be forwarded. Notes: 802.1X for wireless LANs makes NO mention of key distribution or management. This is left for vendor implementation. At logoff, the client will send an EAP-logoff message to force the AP to transit the client port to an unauthorized state Key Management Key Management: BKR (broadcast key rotation) AP periodically broadcasts WEP shared key The initial WEP key only used for registration at the first time. So the WEP key is used less frequently. TKIP (temporal key integrity protocol) hashing the key before using it for encrypting a packet 27
28 MAC Management Layer Synchronization Time Synchronization Function (TSF) Power Management Sleeping without missing any messages Power management functions Periodic sleeping, frame buffering, traffic indication map Association and reassociation Joining a network Roaming, moving from one AP to another Synchronization in All stations maintain a local timer Time Synchronization Function Keeps timers from all stations in sync Timing conveyed by periodic Beacon transmissions Beacon contains Timestamp for the entire BSS Timestamp from Beacons used to calibrate local clocks 28
29 Time Synchronization Function (TSF) Beacon 的 產 生 週 期 稱 為 Beacon Period 可 以 傳 送 Beacon 訊 息 的 時 間 點 稱 為 Target Beacon Transmission Times (TBTTs) 每 個 TBTT 間 隔 一 個 Beacon Period 的 時 間 Beacon transmission may be delayed by CSMA deferral Timestamp contains timer value at transmit time TSF in Ad Hoc Mode: Which One Generates the Beacon? 當 TBTT 時 間 點 到 時, 每 個 節 點 並 不 立 即 送 出 Beacon 訊 息, 而 是 等 待 t 時 槽 的 時 間 t 的 值 由 節 點 個 別 從 [0, w] 之 間 的 整 數 中 隨 機 選 出, 其 中 w 是 一 個 固 定 的 系 統 參 數, 稱 為 Beacon Contention Window Size 節 點 等 待 時 同 時 監 聽 網 路 上 的 訊 息 若 節 點 在 t 時 槽 時 間 內 未 聽 到 其 他 節 點 送 出 的 Beacon 訊 息, 則 在 t 時 槽 時 間 過 後 可 送 出 自 己 的 Beacon 訊 息 若 節 點 在 t 時 槽 時 間 內 聽 到 別 的 節 點 送 出 的 Beacon 訊 息, 則 取 消 傳 送, 改 為 接 收 此 訊 息 每 個 接 收 到 Beacon 訊 息 的 節 點 檢 視 其 中 的 時 間 戳 記 若 發 現 Beacon 訊 息 的 時 間 戳 記 晚 於 自 己 本 身 時 鐘 的 時 間, 則 將 自 己 的 時 鐘 調 整 成 時 間 戳 記 所 示 的 時 間 29
30 Power Management Power management is important to mobile devices that are battery powered. Current LAN protocol assumes stations are always ready to receive Idle receive state dominates LAN adaptor power consumption over time Power Management Protocol allows transceiver to be off as much as possible is transparent to existing protocols Power Management in Infrastructure Mode Allow idle stations to go to sleep Station s power save mode stored in AP APs buffer packets for sleeping stations AP announces which stations have frames buffered Traffic Indication Map (TIM) sent with every Beacon 30
31 Power Management in Infrastructure Mode (cont.) Power saving stations wake up periodically listen for Beacons If it has packets buffered, it then sends a power-save poll request frame to the AP AP will send the buffered frame to the station The station can sleep again Power Management in Ad Hoc Mode Similar to the infrastructure mode However, the buffering scheme is achieved by the sending station (as no AP here) Sleeping station also wakes up periodically to listen Beacon and ATIM If it has data buffered, sends an Ack and wakes up Sending station sends the data to the sleeping station 31
32 Distributed Coordination Function: CSMA/CA CSMA: Carrier Sense Multiple Access physical carrier sense: physical layer virtual carrier sense: MAC layer network allocation vector (NAV) CA: Collision Avoidance random backoff procedure shall be implemented in all stations and APs Carrier Sense: Carrier Presence B wants to send to C at this time A B C B senses carrier so it starts sending Data time 32
33 Carrier Sense: No Carrier Data B wants to send to C at this time A B C B senses no carrier so it defers sending Data B starts sending only after the medium is free time Hidden Terminal Problem B Data B s signal range A C wants to send to A at this time Data C B s a hidden terminal to C and vise versa collision C senses carrier so it starts sending time 33
34 ACK: Collision Detection B A Data 1 C Data 7 ACK 1 Data 2 Data 1 OK No ACK 7 Data 2 No ACK 2 CTS/RTS: Virtual Carrier d B B knows A is to receive C s data in d CTS(d) B won t send A any data in d RTS A C wants to send to A RTS(k) CTS(d) Data ACK C C knows A is ready to receive time 34
35 Problem With Persistent CSMA B B wants to send to A at this time B senses signal so it waits too A busy C wants to send to A at this time C senses A s signal so it waits C B starts sending as soon as it senses carrier collide C starts sending as soon as it senses carrier time Collision Avoidance: Random Backoff B A C When B senses carrier it starts a timer busy When C senses carrier it starts a timer Timer value is determined by random B senses signal at this time time 35
36 Contention Window random 1 data frame The winner busy contention window DIFS random 2 All stations must wait DIFS after medium is free random 3 time SIFS: Giving Priority to RTS/CTS/ACK Source data frame busy Destination DIFS contention window ACK Others SIFS SIFS Defer access DIFS 36
37 SIFS: Transmitting Fragments Source Fragment 1 SIFS Fragment 2 DIFS SIFS Destination SIFS ACK SIFS ACK Contention Window Others Defer access EIFS: Low Priority Retransmission Source data frame can resend busy Destination DIFS contention window EIFS DIFS No ACK Others SIFS SIFS Defer access contension 37
38 CSMA/CA with RTS/CTS Source RTS SIFS SIFS data frame busy Destination CTS ACK contention window Others SIFS NAV (RTS) SIFS DIFS NAV (CTS) RTS/CTS is Optional system parameter RTSThread RTS/CTS is used only when frame size RTSThread 38
39 Point Coordination Function An alternative access method Shall be implemented on top of the DCF A point coordinator (polling master) is used to determine which station currently has the right to transmit. Shall be built up from the DCF through the use of an access priority mechanism. Different accesses of traffic can be defined through the use of different values of IFS. Contention Free Period SIFS B D1+poll U1+ack Contention free Period (CFP) SIFS D2+ack +poll U2+ack SIFS D3+ack +poll PIFS D4+poll U4+ack SIFS CF+End PIFS SIFS SIFS SIFS SIFS<PIFS<DIFS NAV 39
40 Summary IEEE Wireless LAN Architecture IEEE Physical Layer DSSS Authentication: WEP, 802.1x IEEE MAC CSMA/CA PCF 40
Chapter 7 Low-Speed Wireless Local Area Networks
Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics
802.11. Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak
802.11 Markku Renfors Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak Contents 802.11 Overview & Architecture 802.11 MAC 802.11 Overview and Architecture
IEEE802.11 Wireless LAN
IEEE802.11 The broadband wireless Internet Maximilian Riegel wlan-tutorial.ppt-1 (28.11.2000) WLAN Dream Finally Seems to Happen... Recently lots of serious WLAN activities have been announced Big players
Lecture 17: 802.11 Wireless Networking"
Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion
CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)
CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,
Basic processes in IEEE802.11 networks
Module contents IEEE 802.11 Terminology IEEE 802.11 MAC Frames Basic processes in IEEE802.11 networks Configuration parameters.11 Architect. 1 IEEE 802.11 Terminology Station (STA) Architecture: Device
Wiereless LAN 802.11
Tomasz Kurzawa Wiereless LAN 802.11 Introduction The 802.11 Architecture Channels and Associations The 802.11 MAC Protocol The 802.11 Frame Introduction Wireless LANs are most important access networks
CSMA/CA. Information Networks p. 1
Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not
CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006
CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)
Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,
Security in IEEE 802.11 WLANs
Security in IEEE 802.11 WLANs 1 IEEE 802.11 Architecture Extended Service Set (ESS) Distribution System LAN Segment AP 3 AP 1 AP 2 MS MS Basic Service Set (BSS) Courtesy: Prashant Krishnamurthy, Univ Pittsburgh
IEEE 802 Protocol Layers. IEEE 802.11 Wireless LAN Standard. Protocol Architecture. Protocol Architecture. Separation of LLC and MAC.
IEEE 802.11 Wireless LAN Standard IEEE 802 Protocol Layers Chapter 14 Protocol Architecture Functions of physical layer: Encoding/decoding of signals Preamble generation/removal (for synchronization) Bit
802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale
802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data-rate applications Ability to
WiFi. Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman. WiFi 1
WiFi Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman WiFi 1 What is the goal of 802.11 standard? To develop a Medium Access Control (MAC) and Physical Layer (PHY) specification for wireless
... neither PCF nor CA used in practice
IEEE 802.11 MAC CSMA/CA with exponential backoff almost like CSMA/CD drop CD CSMA with explicit ACK frame added optional feature: CA (collision avoidance) Two modes for MAC operation: Distributed coordination
IEEE 802.11 WLAN (802.11) ...Copyright. Renato Lo Cigno www.disi.unitn.it/locigno/didattica/nc/
WLAN (802.11) Renato Lo Cigno www.disi.unitn.it/locigno/didattica/nc/...copyright Quest opera è protetta dalla licenza Creative Commons NoDerivs-NonCommercial. Per vedere una copia di questa licenza, consultare:
How To Understand The Power Of A Network On A Microsoft Ipa 2.5 (Ipa) 2.2.2 (Ipam) 2-2.5-2 (Networking) 2 (Ipom) 2(2
Workshop Presentation Chapter4 Yosuke TANAKA Agenda(Framing in Detail) Data Frames Control Frames type RTS Duration CTS Addressing (!!important!!) Variation on Data Frame Theme Applied Data Framing ACK
Lecture 7 Multiple Access Protocols and Wireless
Lecture 7 Multiple Access Protocols and Wireless Networks and Security Jacob Aae Mikkelsen IMADA November 11, 2013 November 11, 2013 1 / 57 Lecture 6 Review What is the responsibility of the link layer?
Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN 2067 4074
Issues in WiFi Networks Nicolae TOMAI Faculty of Economic Informatics Department of IT&C Technologies Babes Bolyai Cluj-Napoca University, Romania [email protected] Abstract: The paper has four sections.
Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman
1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers
IEEE 802.11 Technical Tutorial. Introduction. IEEE 802.11 Architecture
IEEE 802.11 Technical Tutorial Introduction The purpose of this document is to give technical readers a basic overview of the new 802.11 Standard, enabling them to understand the basic concepts, principle
Lecture 6.1 Introduction. Giuseppe Bianchi, Ilenia Tinnirello
PART 6 IEEE 802.11 Wireless LANs Lecture 6.1 Introduction WLAN History Ł Original goal: Deploy wireless Ethernet First generation proprietary solutions (end 80, begin 90) WaveLAN (AT&T)) HomeRF (Proxim)
Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards
White Paper Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards By Dr. Wen-Ping Ying, Director of Software Development, February 2002 Introduction Wireless LAN networking allows the
IEEE 802.11 Wireless LAN Standard. Updated: 5/10/2011
IEEE 802.11 Wireless LAN Standard Updated: 5/10/2011 IEEE 802.11 History and Enhancements o 802.11 is dedicated to WLAN o The group started in 1990 o First standard that received industry support was 802.11b
Chapter 2 Wireless Networking Basics
Chapter 2 Wireless Networking Basics Wireless Networking Overview Some NETGEAR products conform to the Institute of Electrical and Electronics Engineers (IEEE) 802.11g standard for wireless LANs (WLANs).
Wireless Local Area Networks and the 802.11 Standard
Wireless Local Area Networks and the 802.11 Standard March 31, 2001 Plamen Nedeltchev, PhD Edited by Felicia Brych Table of Contents1 Introduction... 3 Upper Layer Protocols of OSI... 3 WLAN Architecture...
10. Wireless Networks
Computernetzwerke und Sicherheit (CS221) 10. Wireless Networks 1. April 2011 omas Meyer Departement Mathematik und Informatik, Universität Basel Chapter 6 Wireless and Mobile Networks (with changes CS221
Wireless LAN Security Mechanisms
Wireless LAN Security Mechanisms Jingan Xu, Andreas Mitschele-Thiel Technical University of Ilmenau, Integrated Hard- and Software Systems Group [email protected], [email protected] Abstract.
WI-FI TECHNOLOGY: SECURITY ISSUES
RIVIER ACADEMIC JOURNAL, VOLUME 2, NUMBER 2, FALL 2006 WI-FI TECHNOLOGY: SECURITY ISSUES Vandana Wekhande* Graduate student, M.S. in Computer Science Program, Rivier College Keywords: Wireless Internet,802.11b,
Wireless security. Any station within range of the RF receives data Two security mechanism
802.11 Security Wireless security Any station within range of the RF receives data Two security mechanism A means to decide who or what can use a WLAN authentication A means to provide privacy for the
802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi [email protected]
802.11 Security (WEP, WPA\WPA2) 19/05/2009 Giulio Rossetti Unipi [email protected] 802.11 Security Standard: WEP Wired Equivalent Privacy The packets are encrypted, before sent, with a Secret Key
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software
Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set
WildPackets Guide to Wireless LAN Analysis
WildPackets Guide to Wireless LAN Analysis Executive Summary The market for wireless communications has grown rapidly since the introduction of 802.11 wireless local area networking (WLAN) standards. Business
Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2002): 15 Wireless LAN Security 1 Dr.-Ing G.
Network Security Chapter 15 Security of Wireless Local Area Networks Network Security WS 2002: 15 Wireless LAN Security 1 IEEE 802.11 IEEE 802.11 standardizes medium access control MAC and physical characteristics
EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers
EECS 122: Introduction to Computer Networks Multiaccess Protocols Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776
IEEE 802.11e WLANs / WMM. S.Rajesh ([email protected]) AU-KBC Research Centre, BroVis Wireless Networks, smartbridges Pte Ltd.
IEEE 802.11e WLANs / WMM S.Rajesh ([email protected]) AU-KBC Research Centre, BroVis Wireless Networks, smartbridges Pte Ltd. Outline A short review of 802.11 MAC Drawbacks of 802.11 MAC Application
A Technical Tutorial on the IEEE 802.11 Protocol
A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner Director of Engineering copyright BreezeCOM 1997 Introduction The purpose of this document is to give technical readers a basic overview
White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points. http://www.veryxtech.com
White paper Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points http://www.veryxtech.com White Paper Abstract Background The vulnerabilities spotted in the Wired Equivalent Privacy (WEP) algorithm
COMP 3331/9331: Computer Networks and Applications
COMP 3331/9331: Computer Networks and Applications Week 10 Wireless Networks Reading Guide: Chapter 6: 6.1 6.3 Wireless Networks + Security 1 Wireless and Mobile Networks Background: # wireless (mobile)
ECE 428 Computer Networks and Security
ECE 428 Computer Networks and Security 1 Instructor: Sagar Naik About the Instructor Office: EIT 4174, ECE Dept. Other courses that I teach ECE 355: Software Engineering ECE 453/CS 447/ SE 465: Software
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
The Wireless Network Road Trip
The Wireless Network Road Trip The Association Process To begin, you need a network. This lecture uses the common logical topology seen in Figure 9-1. As you can see, multiple wireless clients are in
Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:
WLAN: Wireless LAN Make use of a wireless transmission medium Tipically restricted in their diameter: buildings, campus, single room etc.. The global goal is to replace office cabling and to introduce
LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs
LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when
How To Analyze The Security On An Ipa Wireless Sensor Network
Throughput Analysis of WEP Security in Ad Hoc Sensor Networks Mohammad Saleh and Iyad Al Khatib iitc Stockholm, Sweden {mohsaleh, iyad}@iitc.se ABSTRACT This paper presents a performance investigation
LP-348. LP-Yagy2415. LP-510G/550G 54M Wireless Adapter PCMCIA/PCI. User Guide Ver:2.0 LP-5420G WWW.LANPRO.COM
LP-348 LP-Yagy2415 LP-1518 LP-5P LP-510G/550G 54M Wireless Adapter PCMCIA/PCI User Guide Ver:2.0 LP-5420G WWW.LANPRO.COM COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. is a
802.11 Wireless LAN Protocol CS 571 Fall 2006. 2006 Kenneth L. Calvert All rights reserved
802.11 Wireless LAN Protocol CS 571 Fall 2006 2006 Kenneth L. Calvert All rights reserved Wireless Channel Considerations Stations may move Changing propagation delays, signal strengths, etc. "Non-transitive"
Medium Access Control (MAC) and Wireless LANs
Medium Access Control (MAC) and Wireless LANs Outline Wireless LAN Technology Medium Access Control for Wireless IEEE 802.11 Wireless LAN Applications LAN Extension Cross-building interconnect Nomadic
An Investigation of the Impact of Signal Strength on Wi-Fi Link Throughput through Propagation Measurement. Eric Cheng-Chung LO
An Investigation of the Impact of Signal Strength on Wi-Fi Link Throughput through Propagation Measurement Eric Cheng-Chung LO A dissertation submitted to Auckland University of Technology in partial fulfillment
Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace
Lab Exercise 802.11 Objective To explore the physical layer, link layer, and management functions of 802.11. It is widely used to wireless connect mobile devices to the Internet, and covered in 4.4 of
EPL 657 Wireless Networks
EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing
Video Transmission over Wireless LAN. Hang Liu [email protected]
Video Transmission over Wireless LAN Hang Liu [email protected] Page 1 Introduction! Introduction! Wi-Fi Multimedia and IEEE 802.11e for QoS Enhancement! Error Control Techniques Page 2 Introduction!
Overview of 802.11 Networks and Standards
Overview of 802.11 Networks and Standards Mauri Kangas, Helsinki University of Technology, 17.02.2004 Mauri Kangas 17.2.2004 Page 1 (34) Family of 802.xx Standards ISO/IEC 8802-xx = IEEE 802.xx IEEE 802.1
Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected]
Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected] Ground Setting Three Basics Availability Authenticity Confidentiality Challenge
TL-WN310G 54M Wireless CardBus Adapter
54M Wireless CardBus Adapter Rev: 1.0.1 1910010042 COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. is a registered trademark of TP-LINK TECHNOLOGIES CO., LTD. Other brands and
Your 802.11 Wireless Network has No Clothes
Your 802.11 Wireless Network has No Clothes William A. Arbaugh Narendar Shankar Y.C. Justin Wan Department of Computer Science University of Maryland College Park, Maryland 20742 March 30, 2001 Abstract
Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos [email protected] 2-2009
Unit of Learning # 2 The Physical Layer Sergio Guíñez Molinos [email protected] 2-2009 Local Area Network (LAN) Redes de Computadores 2 Historic topologies more used in LAN Ethernet Logical Bus and Physical
Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh
Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh, Ph.D. [email protected] Mesh 2008, Cap Esterel, France 1 Abstract Abundant hidden node collisions and correlated channel access
The next generation of knowledge and expertise Wireless Security Basics
The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com
IEEE 802.11 frame format
IEEE 802.11 frame format Pietro Nicoletti www.studioreti.it 802-11-Frame - 1 P. Nicoletti: see note pag. 2 Copyright note These slides are protected by copyright and international treaties. The title and
Chapter 6: Wireless and Mobile Networks
Chapter 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime
Wireless LAN Pen-Testing. Part I
Wireless LAN Pen-Testing Part I To know your Enemy, you must become your Enemy (Sun Tzu, 600 BC) Georg Penn 23.03.2012 Motivation Read manuals, documentation, standards Check sources for their reliability,
Based on Computer Networking, 4 th Edition by Kurose and Ross
Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,
Wireless Personal Area Networks (WPANs)
Wireless Personal Area Networks (WPANs) Bluetooth, ZigBee Contents Introduction to the IEEE 802 specification family Concept of ISM frequency band Comparison between different wireless technologies ( and
Wireless LAN Services for Hot-Spot
Wireless LAN Services for Hot-Spot Woo-Yong Choi Electronics and Telecommunications Research Institute [email protected] ETRI Contents Overview Wireless LAN Services Current IEEE 802.11 MAC Protocol
Philippe Klein. avb-phkl-802-11-qos-overview-0811-1
802.11 QoS Overview Philippe Klein IEEE Plenary Meeting Nov 08 Dallas, TX avb-phkl-802-11-qos-overview-0811-1 Disclaimer This presentation is not a highly detailed technical presentation but a crash course
The Basics of Wireless Local Area Networks
The Basics of Wireless Local Area Networks Andreas Johnsen Student at Mälardalens högskola [email protected] +46 712345678 ABSTRACT This paper is written as a brief education about the basics of
Efficient MAC Protocol for Heterogeneous Cellular Networks (HC-MAC)
Vol.2, Issue.2, Mar-Apr 2012 pp-078-083 ISSN: 2249-6645 Efficient MAC Protocol for Heterogeneous Cellular Networks (HC-MAC) 1 Y V Adi Satyanarayana, 2 Dr. K Padma Raju 1 Y V Adi Satyanarayana, Assoc. Professor,
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,
A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11
A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11 Christian Röhl, Hagen Woesner, Adam Wolisz * Technical University Berlin Telecommunication Networks Group {roehl,
Wireless LAN Access Point. IEEE 802.11g 54Mbps. User s Manual
Wireless LAN Access Point IEEE 802.11g 54Mbps User s Manual Table of Contents Chapter 1 Introduction... 1 1.1 Package Contents...2 1.2 Features...2 1.3 Specifications...2 1.4 Physical Description...3 Chapter
Ph.D. Thesis. Resources optimization in multimedia communications. Luca Sanna Randaccio. Advisor: Prof. Luigi Atzori
Ph.D. Thesis Resources optimization in multimedia communications Luca Sanna Randaccio Advisor: Prof. Luigi Atzori University of Cagliari Department of Electrical and Electronic Engineering Table of Contents
Wireless LAN Concepts
Wireless LAN Concepts Wireless LAN technology is becoming increasingly popular for a wide variety of applications. After evaluating the technology, most users are convinced of its reliability, satisfied
Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD
Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch
EETS 8316 Wireless Networks Fall 2013
EETS 8316 Wireless Networks Fall 2013 Lecture: WiFi Discovery, Powersave, and Beaconing http://lyle.smu.edu/~skangude/eets8316.html Shantanu Kangude [email protected] Discovery and Beaconing Discovery?
Chapter 6 CDMA/802.11i
Chapter 6 CDMA/802.11i IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Some material copyright 1996-2012 J.F Kurose and K.W. Ross,
EPI-3601S Wireless LAN PCI adapter Version 1.2 EPI-3601S. Wireless LAN PCI Adapter. (802.11g & 802.11b up to 108 Mbps) User Manual. Version: 1.
EPI-3601S Wireless LAN PCI Adapter (802.11g & 802.11b up to 108 Mbps) User Manual Version: 1.2 1 TABLE OF CONTENTS 1 INTRODUCTION...3 2 FEATURES...3 3 PACKAGE CONTENTS...4 4 SYSTEM REQUIREMENTS...5 5 INSTALLATION...5
White Paper. D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. E-mail: [email protected]; Web: http://www.dlink-intl.
Introduction to Voice over Wireless LAN (VoWLAN) White Paper D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. Introduction Voice over Wireless LAN (VoWLAN) is a technology involving the use
Wireless Networking Basics. NETGEAR, Inc. 4500 Great America Parkway Santa Clara, CA 95054 USA
Wireless Networking Basics NETGEAR, Inc. 4500 Great America Parkway Santa Clara, CA 95054 USA n/a October 2005 2005 by NETGEAR, Inc. All rights reserved. Trademarks NETGEAR and Auto Uplink are trademarks
ECE/CS 372 introduction to computer networks. Lecture 13
ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:
Introduction Chapter 1. Uses of Computer Networks
Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks
VoIP in 802.11. Mika Nupponen. S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1
VoIP in 802.11 Mika Nupponen S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1 Contents Introduction VoIP & WLAN Admission Control for VoIP Traffic in WLAN Voice services in IEEE 802.11
HIGH POWER WIRELESS N MINI USB ADAPTER K-300MWUN USER S MANUAL
HIGH POWER WIRELESS N MINI USB ADAPTER K-300MWUN USER S MANUAL Introduction Thank you for your purchase of the Kozumi K-300MWUN High Power Wireless N Mini USB Adapter. Featuring wireless technology, this
Post-Class Quiz: Telecommunication & Network Security Domain
1. What type of network is more likely to include Frame Relay, Switched Multi-megabit Data Services (SMDS), and X.25? A. Local area network (LAN) B. Wide area network (WAN) C. Intranet D. Internet 2. Which
Networking: Certified Wireless Network Administrator Wi Fi Engineering CWNA
coursemonster.com/uk Networking: Certified Wireless Network Administrator Wi Fi Engineering CWNA View training dates» Overview This new market-leading course from us delivers the best in Wireless LAN training,
LTE, WLAN, BLUETOOTHB
LTE, WLAN, BLUETOOTHB AND Aditya K. Jagannatham FUTURE Indian Institute of Technology Kanpur Commonwealth of Learning Vancouver 4G LTE LTE (Long Term Evolution) is the 4G wireless cellular standard developed
Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III
Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins
Getting Started with HP Wireless Networks. Version 10.41
Getting Started with HP Wireless Networks Version 10.41 Copyright 2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties
CSE 123A Computer Networks
CSE 123A Computer Networks Winter 2005 Lecture 5: Data-Link II: Media Access Some portions courtesy Srini Seshan or David Wetherall Last Time Framing: How to translate a bitstream into separate packets
Wireless Security. New Standards for 802.11 Encryption and Authentication. Ann Geyer 209-754-9130 [email protected] www.tunitas.
Wireless Security New Standards for 802.11 Encryption and Authentication Ann Geyer 209-754-9130 [email protected] www.tunitas.com National Conference on m-health and EOE Minneapolis, MN Sept 9, 2003 Key
Wi-Fi Why Now? Exploring New Wireless Technologies for Industrial Applications
Wi-Fi Why Now? Exploring New Wireless Technologies for Industrial Applications Patrick McCurdy Product Marketing Manager Phoenix Contact Inc. [email protected] Ira Sharp Product Specialist Phoenix
IEEE 802.11 WIRELESS LAN STANDARD
CHAPTER14 IEEE 802.11 WIRELESS LAN STANDARD 14.1 IEEE 802 Architecture Protocol Architecture MAC Frame Format Logical Link Control 14.2 IEEE 802.11 Architecture and Services IEEE 802.11 Architecture IEEE
