The Wireless Network Road Trip



Similar documents
CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

IEEE frame format

Basic processes in IEEE networks

Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak

Lab Exercise Objective. Requirements. Step 1: Fetch a Trace

10. Wireless Networks

Wiereless LAN

COMP 3331/9331: Computer Networks and Applications

Internet Packets. Forwarding Datagrams

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring Mike Freedman

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Access Point Configuration

Data Link Protocols. Link Layer Services. Framing, Addressing, link access: Error Detection:

Data Center Networks, Link Layer Wireless (802.11)

Chapter 6: Wireless and Mobile Networks

The IP Transmission Process. V1.4: Geoff Bennett

Chapter 7 Low-Speed Wireless Local Area Networks

This chapter covers the following topics: Characteristics of roaming Layer 2 roaming Layer 3 roaming and an introduction to Mobile IP

Wireless LAN Pen-Testing. Part I

2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above

Wireless Encryption Protection

Legacy Security

OSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R

What is VLAN Routing?

Security Awareness. Wireless Network Security

EETS 8316 Wireless Networks Fall 2013

Wireless Local Area Networks (WLANs)

Based on Computer Networking, 4 th Edition by Kurose and Ross

Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)

CSMA/CA. Information Networks p. 1

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

Nokia Siemens Networks. CPEi-lte User Manual

Virtual Access Points

Verifying Detection of Asset Tags in WLAN Controllers

Welch Allyn Connex, VitalsLink by Cerner, and Connex CSK Network installation. Best practices overview

ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3

Mobility Management 嚴 力 行 高 雄 大 學 資 工 系

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Lecture 17: Wireless Networking"

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

A Division of Cisco Systems, Inc. GHz g. Wireless-G. Access Point with SRX. User Guide WIRELESS WAP54GX. Model No.

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

VLANs. Application Note

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

Create Virtual AP for Network Campus with Mikrotik

How To Understand The Power Of A Network On A Microsoft Ipa 2.5 (Ipa) (Ipam) (Networking) 2 (Ipom) 2(2

User Manual Network Interface

Configuration. Windows 98 and Me Configuration

Ethernet. Ethernet. Network Devices

How do I get to

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops

Agenda. What is Hybrid AP Fat AP vs. Thin AP Benefits of ZyXEL Hybrid AP How Managed AP finds the Controller AP Web GUI

This Lecture. The Internet and Sockets. The Start If everyone just sends a small packet of data, they can all use the line at the same.

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

The OSI and TCP/IP Models. Lesson 2

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

Wifi Web Server Module w TF Socket User s Guide

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

hp ProLiant network adapter teaming

Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław

Virtual Private Network VPN IPSec Testing: Functionality Interoperability and Performance

SERVICE DISCOVERY AND MOBILITY MANAGEMENT

Communication Systems Internetworking (Bridges & Co)

CSE 123: Computer Networks Fall Quarter, 2014 MIDTERM EXAM

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

Written examination in Computer Networks

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

VXLAN: Scaling Data Center Capacity. White Paper

Real-Time Communication in IEEE Wireless Mesh Networks: A Prospective Study

Useful CLI Commands. Contents. Enable Logging

Lecture 7 Multiple Access Protocols and Wireless

Data Link Protocols. TCP/IP Suite and OSI Reference Model

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

An Overview of ZigBee Networks

TCP in Wireless Networks

The Basics of Wireless Local Area Networks

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004

Wireless LAN Protocol CS 571 Fall Kenneth L. Calvert All rights reserved

TECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012

IEEE WLAN (802.11) ...Copyright. Renato Lo Cigno

IEEE Wireless LAN

Security in Wireless Local Area Network

Security in IEEE WLANs

Ubiquiti Networks Inc. INSTANT OUTDOOR HOTSPOT User Manual

Networking Test 4 Study Guide

Vocia MS-1 Network Considerations for VoIP. Vocia MS-1 and Network Port Configuration. VoIP Network Switch. Control Network Switch

WRE2205. User s Guide. Quick Start Guide. Wireless N300 Range Extender. Default Login Details. Version 1.00 Edition 1, 06/2012

RF Monitor and its Uses

Configuring QoS in a Wireless Environment

Introduction to Network Security Lab 1 - Wireshark

Transcription:

The Wireless Network Road Trip

The Association Process To begin, you need a network. This lecture uses the common logical topology seen in Figure 9-1. As you can see, multiple wireless clients are in range of an AP that is advertising multiple service set identifiers (SSID). One SSID puts users on a network that is offered to guest users called Guest. The other SSID is called UserNet and is designed for authenticated users of the corporate network. Naturally, more security is going to be applied to users of UserNet, such as authentication and encryption, as opposed to the network Guest. The Guest network places users on the 172.30.1.0/24 subnet. The UserNet places users on the 10.99.99.0/24 network. Although these two networks are on different subnets and users associate with different SSIDs, recall that an AP can advertise multiple SSIDs but actually uses the same wireless radio. In the wireless space, the SSID and IP subnet keep the networks logically separated.

Clients have more than one way to find an AP and associate with it. A client can passively scan the network and listen on each frequency for beacons being sent by an AP, or it can use an active scan process and send a probe request in search of a specific AP. Users of the UserNet would likely actively scan the network, whereas a guest would passively scan.

Getting back to the association process, a client scans the channels hoping to hear a beacon from an AP or actively sends a probe request. If a probe response is received or a beacon is heard, the client can attempt to associate with the SSID received in that probe response or beacon.

The next step is to authenticate and associate with the AP. When the client chooses an SSID, it sends an authentication request. The AP should reply with an authentication response. After this occurs and a Success message is received, an association request is sent, including the data rates and capabilities of the client, followed by an association response from the AP. The association response from the AP includes the data rates that the AP is capable of, other capabilities, and an identification number for the association.

Next, the client must determine the speed. It does this by determining the Received Signal Strength Indicator (RSSI) and signal-to-noise ratio (SNR), and it chooses the best speed to send at based on these determinations. Just as the client determines its rates to send, the AP, in turn, does the same. Now that the client is associated, it can attempt to send data to other devices on the network.

Sending to a Host on Another Subnet When a client is associated with an AP, the general idea is to send data to other devices. To illustrate this, first try to send data between Client A in Figure 9-2, which is on the UserNet network, and Client B, which is on the Guest network. Although a typical network would not allow guest users to send traffic to internal WLAN users for security purposes, this will provide an example of how the connection works.

The two clients are clearly on two different subnets. The clients cannot send traffic directly to each other. They would first determine that the other is not on the same subnet and then decide to use a default gateway to relay the information. If a client has never communicated with the default gateway, it uses Address Resolution Protocol (ARP) to resolve its MAC address. The process would appear as follows:

Step 1. Client A wants to send traffic to Client B. Step 2. Client A determines that the IP address of Client B is not on the same subnet. Step 3. Client A decides to send the traffic to the default gateway of 10.99.99.5. Step 4. Client A looks in its ARP table for a mapping to the gateway, but it is not there. Step 5. Client A creates an ARP request and sends to the AP, as seen in Figure 9-3.

When the ARP request is sent to the AP, it is an interesting process and actually works a little bit differently than on a wired network. Remember that on a wired network, the header has only two MAC addresses: the source address and the destination address. An 802.11 frame can have four addresses: the source address (SA), destination address (DA), transmitter address (TA), and receiving address (RA). In this situation, the SA is the MAC of the client sending the ARP request, the DA is broadcast (for the ARP), and the RA is the AP. No TA is present in this example. Figure 9-4 shows the ARP request.

The AP receives the ARP and sees its MAC address. The AP then forwards the frame to the WLC using the Lightweight Access Point Protocol (LWAPP), as illustrated in Figure 9-5

The LWAPP frame that travels from the AP to the WLC is traveling on a wired network. This brings the question, What happened to the 802.11 frame format? LWAPP simply encapsulates the frame inside a 6-byte header. The new 6-byte header has the AP IP and MAC address as the source and the WLC IP and MAC address as the destination. Encapsulated inside of that header is the original 802.11 frame with the three MAC addresses, including the broadcast MAC address for the ARP process. When the WLC receives the LWAPP frame, it opens the frame revealing the ARP request and rewrites the ARP request in an 802.3 frame that can be sent across the wired network. The first address from the 802.11 frame is dropped, the second address is placed as the source address in the new 802.3 frame, and the third address, the broadcast address, is placed as the destination address. The WLC then forwards the ARP request, in 802.3 format, across the wired network, as seen in Figure 9-6. Here you can see how the frame appears between the wireless Client A and the AP, how the AP encapsulates the frame and sends it to the WLC, and how the WLC rewrites the frame and sends it to the wired network.

As switches receive the ARP request, they read the destination MAC address, which is a broadcast, and flood the frame out all ports except the one it came in on. At some point, the frame will be received by a Layer 3 device, hopefully the default gateway. In Figure 9-7, the router has received the ARP request and will respond to it with its MAC address.

That ARP response is sent back as a unicast message, so the switches in the path are going to forward it directly to the port that leads back to the wireless client, rather than flooding the frame out all ports. Eventually the frame is received by the WLC, and it must be rebuilt as an 802.11 frame. When the WLC rewrites the frame, it places the DA as address 1, the SA as address 3, and the TA as address 2, which is the SSID of the AP. Figure 9-8 illustrates this process.

As illustrated in Figure 9-9, the newly formed 802.11 frame is placed inside an LWAPP header where the AP IP and MAC is the destination and the WLC IP and MAC is the source. The LWAPP frame is forwarded to the AP

Next, the AP must remove the LWAPP header, exposing the 802.11 frame. The 802.11 frame is buffered, and the process of sending a frame on the wireless network begins.

The ARP process of the client now has a mapping to the GW MAC address and can dispatch the awaiting frame.

802.11 frame: addressing frame control 2 2 6 6 6 2 6 0-2312 4 duration address 1 address 2 address 3 seq control address 4 payload CRC Address 1: MAC address of wireless host or AP to receive this frame Address 2: MAC address of wireless host or AP transmitting this frame Address 3: MAC address of router interface to which AP is attached Address 3: used only in ad hoc mode

802.11 frame: addressing H1 R1 router Internet AP R1 MAC addr AP MAC addr dest. address source address 802.3 frame AP MAC addr H1 MAC addr R1 MAC addr address 1 address 2 address 3 802.11 frame

802.11 frame: more duration of reserved transmission time (RTS/CTS) frame seq # (for reliable ARQ) frame control 2 2 6 6 6 2 6 0-2312 4 duration address 1 address 2 address 3 seq control address 4 payload CRC Protocol version 2 2 4 1 1 1 1 1 1 1 1 Type Subtype To AP From AP More frag Retry Power mgt More data WEP Rsvd frame type (RTS, CTS, ACK, data)