IEEE Tutorial by Jim Zyren and Al Petrick

Similar documents
CSMA/CA. Information Networks p. 1

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

WiFi. Is for Wireless Fidelity Or IEEE Standard By Greg Goldman. WiFi 1

Chapter 7 Low-Speed Wireless Local Area Networks

... neither PCF nor CA used in practice

Basic processes in IEEE networks

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:

IEEE Technical Tutorial. Introduction. IEEE Architecture

IEEE Wireless LAN Standard. Updated: 5/10/2011

Wireless LAN Protocol CS 571 Fall Kenneth L. Calvert All rights reserved

IEEE Wireless LAN

Networks. Master of Science (Computer Science and Engineering), December 2004, 45 pp.,

A Technical Tutorial on the IEEE Protocol

Wiereless LAN

Wireless LAN Concepts

Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

Overview of Networks and Standards

CS263: Wireless Communications and Sensor Networks

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III

IEEE 802 Protocol Layers. IEEE Wireless LAN Standard. Protocol Architecture. Protocol Architecture. Separation of LLC and MAC.

An Overview of Wireless LAN Standards IEEE and IEEE e

A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE

Hello viewers, welcome to today s lecture on cellular telephone systems.

The IEEE standard

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

EPL 657 Wireless Networks

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

Wireless Local Area Networks and the Standard

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

CHAPTER 1 1 INTRODUCTION

Lecture 17: Wireless Networking"

Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN)

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring Mike Freedman

Wireless Personal Area Networks (WPANs)

This tutorial has been prepared for readers to help them understand the concepts related to WiFi.

WI-FI TECHNOLOGY: SECURITY ISSUES

Wireless Local Area Networking For Device Monitoring

Wireless Ethernet LAN (WLAN) General a/802.11b/802.11g FAQ

10. Wireless Networks

CDMA TECHNOLOGY. Brief Working of CDMA

Security in IEEE WLANs

TL-WN310G 54M Wireless CardBus Adapter

AM Receiver. Prelab. baseband

IEEE e WLANs / WMM. S.Rajesh (rajeshsweb@gmail.com) AU-KBC Research Centre, BroVis Wireless Networks, smartbridges Pte Ltd.

IEEE WLAN (802.11) ...Copyright. Renato Lo Cigno

Protocolo IEEE Sergio Scaglia SASE Agosto 2012

IEEE WIRELESS LAN STANDARD

LP-348. LP-Yagy2415. LP-510G/550G 54M Wireless Adapter PCMCIA/PCI. User Guide Ver:2.0 LP-5420G

ECE 428 Computer Networks and Security

Telecom Regulatory Authority Technical Affairs & Technology Sector WiFi Technology

Superheterodyne Radio Receivers

Lecture 7 Multiple Access Protocols and Wireless

A MPCP-Based Centralized Rate Control Method for Mobile Stations in FiWi Access Networks

Spring Final Project Report

802.11b and associated network security risks for the home user

LTE, WLAN, BLUETOOTHB

Wireless LAN Networking White Paper

Wi-Fi and Bluetooth - Interference Issues

IEEE g New Draft Standard Clarifies Future of Wireless LAN

communication over wireless link handling mobile user who changes point of attachment to network

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Performance Analysis of the IEEE Wireless LAN Standard 1

Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2002): 15 Wireless LAN Security 1 Dr.-Ing G.

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Adaptive DCF of MAC for VoIP services using IEEE networks

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Frequency Hopping Spread Spectrum PHY of the Wireless LAN Standard. Why Frequency Hopping?

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

Bluetooth voice and data performance in DS WLAN environment

COMP 3331/9331: Computer Networks and Applications

Lecture 6.1 Introduction. Giuseppe Bianchi, Ilenia Tinnirello

Introduction to Ad hoc Networks

ECE/CS 372 introduction to computer networks. Lecture 13

TCOM 370 NOTES LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

Introduction to IEEE Wireless LAN

CWNA: Official Certification Guide Unit 1 Introduction to Wireless LANs

An Investigation of the Impact of Signal Strength on Wi-Fi Link Throughput through Propagation Measurement. Eric Cheng-Chung LO

Networking: Certified Wireless Network Administrator Wi Fi Engineering CWNA

TECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012

Ph.D. Thesis. Resources optimization in multimedia communications. Luca Sanna Randaccio. Advisor: Prof. Luigi Atzori

How To Secure Wireless Networks

Medium Access Control (MAC) and Wireless LANs

Wireless LAN Services for Hot-Spot

How To Understand The Power Of A Network On A Microsoft Ipa 2.5 (Ipa) (Ipam) (Networking) 2 (Ipom) 2(2

ECB GHz Super G 108Mbps Access Point/Client Bridge/Repeater/WDS AP/

LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0

Wireless Network Policy

HIGH POWER WIRELESS N MINI USB ADAPTER K-300MWUN USER S MANUAL

How To Make A Multi-User Communication Efficient

EAP N Wall Mount Access Point / WDS AP / Universal Repeater

Ch GSM PENN. Magda El Zarki - Tcom Spring 98

TOWARDS STUDYING THE WLAN SECURITY ISSUES SUMMARY

What is ? Why are standards important?

How To Analyze The Security On An Ipa Wireless Sensor Network

Tecnologías Inalámbricas.

Transcription:

IEEE 802.11 Tutorial by Jim Zyren and Al Petrick Approval o the IEEE 802.11 standard or wireless local area networking (WLAN) and rapid progress made toward higher data rates have put the promise o truly mobile computing within reach. While wired LANs have been a mainstream technology or at least iteen years, WLANs are uncharted territory or most networking proessionals. Some obvious questions come to mind when considering wireless networking: How can WLANs be integrated with wired network inrastructure? What is the underlying radio technology? How is multiple access handled? What about network security? IEEE 802.11 is limited in scope to the Physical (PHY) layer and Medium Access Control (MAC) sublayer, with MAC origins to IEEE802.3 Ethernet standard. The ollowing overview explains major dierences between wired and wireless LANs and should answer some o the questions acing MIS proessionals evaluating WLAN technology. Network Topology WLANs can be used either to replace wired LANs, or as an extension o the wired LAN inrastructure. The basic topology o an 802.11 network is shown in Figure 1. A Basic Service Set (BSS) consists o two or more wireless nodes, or stations (STAs), which have recognized each other and have established communications. In the most basic orm, stations communicate directly with each other on a peer-to-peer level sharing a given cell coverage area. This type o network is oten ormed on a temporary basis, and is commonly reerred to as an ad hoc network, or Independent Basic Service Set (IBSS). AH2 Ad Hoc Network AH3 AH1 Figure 1 Peer-to-Peer Communications in Ad Hoc Network In most instances, the BSS contains an Access Point (AP). The main unction o an AP is to orm a bridge between wireless and wired LANs. The AP is analogous to a basestation used in cellular phone networks. When an AP is present, stations do not communicate on a peer-to-peer IEEE 802.11 Tutorial 1

basis. All communications between stations or between a station and a wired network client go through the AP. AP s are not mobile, and orm part o the wired network inrastructure. A BSS in this coniguration is said to be operating in the inrastructure mode. Server DISTRIBUTION SYSTEM AP A AP B A1 BSS-A A2 BSS-B B1 B2 Figure 2 ESS Provides Campus-Wide Coverage The Extended Service Set (ESS) shown in Figure 2 consists o a series o overlapping BSSs (each containing an AP) connected together by means o a Distribution System (DS). Although the DS could be any type o network, it is almost invariably an Ethernet LAN. Mobile nodes can roam between APs and seamless campus-wide coverage is possible. Radio Technology IEEE 802.11 provides or two variations o the PHY. These include two (2) RF technologies namely Direct Sequence Spread Spectrum (DSSS), and Frequency Hopped Spread Spectrum (FHSS). The DSSS and FHSS PHY options were designed speciically to conorm to FCC regulations (FCC 15.247) or operation in the 2.4 GHz ISM band, which has worldwide allocation or unlicensed operation. Region Allocated Spectrum US 2.4000 2.4835 GHz Europe 2.4000 2.4835 GHz Japan 2.471-2.497 GHz France 2.4465-2.4835 GHz Spain 2.445-2.475 GHz Table 1 Global Spectrum Allocation at 2.4 GHz Both FHSS and DSSS PHYs currently support 1 and 2 Mbps. However, all 11 Mbps radios are DSSS. Operating principles o DSSS radios are described in the ollowing paragraphs. IEEE 802.11 Tutorial 2

Data 1 bit period Out 11 chips 1 bit 11 chips PRN 01000101111011101000 11 Bit Barker Code (PRN): 1 0 1 1 1 0 1 0 0 0 Figure 3 Digital Modulation o Data with PRN Sequence DSSS systems use technology similar to GPS satellites and some types o cell phones. Each inormation bit is combined via an XOR unction with a longer Pseudo-random Numerical (PN) sequence as shown in Figure 3. The result is a high speed digital stream which is then modulated onto a carrier requency using Dierential Phase Shit Keying (DPSK). 2x CHIP CLOCK Rx DATA FROM ADCs Z -1 1 Z -1 2 Z -1 3 Z -1 4 Z -1 5 Z -1 6 Z -1 2N PARALLEL PN REGISTER LOAD R 1 R 2 R 3 R N N = 16 BARKER CODE: +1-1 +1 +1-1 +1 +1 +1-1 -1-1 S SYMBOL PERIOD CHIP PERIOD A/D SAMPLE CLOCK CORRELATION SCORE Figure 4 Matched Filter Correlator Used or Reception o DSSS Signal When receiving the DSSS signal, a matched ilter correlator is used as shown in Figure 4. The correlator removes the PN sequence and recovers the original data stream. Tat the higher data rates o 5.5 and 11 Mbps, DSSS receivers employ dierent PN codes and a bank o correlators to recover the transmitted data stream. The high rate modulation method is called Complimentary IEEE 802.11 Tutorial 3

Code Keying (CCK). The eects o using PN codes to generate the spread spectrum signal are shown in Figure 5. XOR Figure 5a Eect o PN Sequence on Transmit Spectrum Correlator Figure 5b Received Signal is Correlated with PN to Recover Data and Reject Intererence As shown in Figure 5a, the PN sequence spreads the transmitted bandwidth o the resulting signal (thus the term, spread spectrum ) and reduces peak power. Note however, that total power is unchanged. Upon reception, the signal is correlated with the same PN sequence to reject narrow band intererence and recover the original binary data (Fig. 5b). Regardless o whether the data rate is 1, 2, 5.5, or 11 Mbps, the channel bandwidth is about 20 MHz or DSSS systems. Thereore, the ISM band will accommodate up to three non-overlapping channels 2.4000 GHz Ch. 1 Ch. 6 Ch. 11 2.4835 GHz Figure 6 Three Non-Overlapping DSSS Channels in the ISM Band Multiple Access The basic access method or 802.11 is the Distributed Coordination Function (DCF) which uses Carrier Sense Multiple Access / Collision Avoidance (CSMA / CA). This requires each station to listen or other users. I the channel is idle, the station may transmit. However i it is busy, each station waits until transmission stops, and then enters into a random back o IEEE 802.11 Tutorial 4

procedure. This prevents multiple stations rom seizing the medium immediately ater completion o the preceding transmission. DIFS Src Dest Data SIFS Ack Other DIFS Deer Access Contention Window Next MPDU Backo ater Deer Figure 7 CSMA/CD Back-o Algorithm Packet reception in DCF requires acknowledgement as shown in Figure 7. The period between completion o packet transmission and start o the ACK rame is one Short Inter Frame Space (SIFS). ACK rames have a higher priority than other traic. Fast acknowledgement is one o the salient eatures o the 802.11 standard, because it requires ACKs to be handled at the MAC sublayer. Transmissions other than ACKs must wait at least one DCF inter rame space (DIFS) beore transmitting data. I a transmitter senses a busy medium, it determines a random back-o period by setting an internal timer to an integer number o slot times. Upon expiration o a DIFS, the timer begins to decrement. I the timer reaches zero, the station may begin transmission. However, i the channel is seized by another station beore the timer reaches zero, the timer setting is retained at the decremented value or subsequent transmission. The method described above relies on the Physical Carrier Sense. The underlying assumption is that every station can hear all other stations. This is not always the case. Reerring to Figure 8, the AP is within range o the STA-A, but STA-B is out o range. STA-B would not be able to detect transmissions rom STA-A, and the probability o collision is greatly increased. This is known as the Hidden Node. CTS-Range RTS-Range STA B Access Point STA A Figure 8 RTS/CTS Procedure Eliminates the Hidden Node Problem IEEE 802.11 Tutorial 5

To combat this problem, a second carrier sense mechanism is available. Virtual Carrier Sense enables a station to reserve the medium or a speciied period o time through the use o RTS/CTS rames. In the case described above, STA-A sends an RTS rame to the AP. The RTS will not be heard by STA-B. The RTS rame contains a duration/id ield which speciies the period o time or which the medium is reserved or a subsequent transmission. The reservation inormation is stored in the Network Allocation Vector (NAV) o all stations detecting the RTS rame. Upon receipt o the RTS, the AP responds with a CTS rame, which also contains a duration/id ield speciying the period o time or which the medium is reserved. While STA-B did not detect the RTS, it will detect the CTS and update its NAV accordingly. Thus, collision is avoided even though some nodes are hidden rom other stations. The RTS/CTS procedure is invoked according to a user speciied parameter. It can be used always, never, or or packets which exceed an arbitrarily deined length. As mentioned above, DCF is the basic media access control method or 802.11 and it is mandatory or all stations. The Point Coordination Function (PCF) is an optional extension to DCF. PCF provides a time division duplexing capability to accommodate time bounded, connectionoriented services such as cordless telephony. Logical Addressing The authors o the 802.11 standard allowed or the possibility that the wireless media, distribution system, and wired LAN inrastructure would all use dierent address spaces. IEEE 802.11 only speciies addressing or over the wireless medium, though it was intended speciically to acilitate integration with IEEE 802.3 wired Ethernet LANs. IEEE802 48-bit addressing scheme was thereore adopted or 802.11, thereby maintaining address compatibility with the entire amily o IEEE 802 standards. In the vast majority o installations, the distribution system is an IEEE 802 wired LAN and all three logical addressing spaces are identical. Security IEEE 802.11 provides or security via two methods: authentication and encryption. Authentication is the means by which one station is veriied to have authorization to communicate with a second station in a given coverage area. In the inrastructure mode, authentication is established between an AP and each station. Authentication can be either Open System or Shared Key. In an Open System, any STA may request authentication. The STA receiving the request may grant authentication to any request, or only those rom stations on a user-deined list. In a Shared Key system, only stations which possess a secret encrypted key can be authenticated. Shared Key authentication is available only to systems having the optional encryption capability. Encryption is intended to provide a level o security comparable to that o a wired LAN. The Wired Equivalent Privacy (WEP) eature uses the RC4 PRNG algorithm rom RSA Data Security, Inc. The WEP algorithm was selected to meet the ollowing criteria: reasonably strong sel-synchronizing computationally eicient exportable optional IEEE 802.11 Tutorial 6

Timing and Power Management All station clocks within a BSS are synchronized by periodic transmission o time stamped beacons. In the inrastructure mode, the AP serves as the timing master and generates all timing beacons. Synchronization is maintained to within 4 microseconds plus propagation delay. Timing beacons also play an important role in power management. There are two power saving modes deined: awake and doze. In the awake mode, stations are ully powered and can receive packets at any time. Nodes must inorm the AP beore entering doze. In this mode, nodes must wake up periodically to listen or beacons which indicate that AP has queued messages. Roaming Roaming is perhaps the least deined eature among those discussed in this article. The standard does identiy the basic message ormats to support roaming, but everything else is let up to network vendors. In order to ill the void, the Inter-Access Point Protocol (IAPP) was jointly developed by Aironet, Lucent Technologies, and Digital Ocean. Among other things, IAPP extends multi-vendor interoperability to the roaming unction. It addresses roaming within a single ESS and between two or more ESSs. The Wireless Ethernet Compatibility Alliance The recently adopted Complimentary Code Keying (CCK) waveorm delivers speeds o 5.5 and 11 Mbps in the same occupied bandwidth as current generation 1 and 2 Mbps DSSS radios and will be ully backward compatible. Now that a standard is irmly in place, WLANs will become a part o the enterprise networking landscape within the next twelve months. The mission o the Wireless Ethernet Compatibility Alliance is to provide certiication o compliance with the IEEE 802.11 Standard and to ensure that products rom multiple vendor meet strict requirements or interoperability. With cross vendor interoperability assured, WLANs are now able to ulill the promise o high speed mobile computing. IEEE 802.11 Tutorial 7