Wireless Networking. Media Access Control Layer Standards Module-06

Similar documents
Chapter 7 Low-Speed Wireless Local Area Networks

CSMA/CA. Information Networks p. 1

Wiereless LAN

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

Basic processes in IEEE networks

Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak

IEEE Wireless LAN Standard. Updated: 5/10/2011

IEEE 802 Protocol Layers. IEEE Wireless LAN Standard. Protocol Architecture. Protocol Architecture. Separation of LLC and MAC.

IEEE Technical Tutorial. Introduction. IEEE Architecture

Wireless LAN Protocol CS 571 Fall Kenneth L. Calvert All rights reserved

Lecture 17: Wireless Networking"

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

WiFi. Is for Wireless Fidelity Or IEEE Standard By Greg Goldman. WiFi 1

A Technical Tutorial on the IEEE Protocol

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

An Overview of Wireless LAN Standards IEEE and IEEE e

How To Understand The Power Of A Network On A Microsoft Ipa 2.5 (Ipa) (Ipam) (Networking) 2 (Ipom) 2(2

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:

TCP in Wireless Networks

... neither PCF nor CA used in practice

Lab Exercise Objective. Requirements. Step 1: Fetch a Trace

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

TECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012

The Wireless Network Road Trip

IEEE Wireless LAN

EETS 8316 Wireless Networks Fall 2013

IEEE WLAN (802.11) ...Copyright. Renato Lo Cigno

10. Wireless Networks

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III

IEEE e WLANs / WMM. S.Rajesh (rajeshsweb@gmail.com) AU-KBC Research Centre, BroVis Wireless Networks, smartbridges Pte Ltd.

Overview of Networks and Standards

Mustafa Ergen June 2002 Department of Electrical Engineering and Computer Science University of California Berkeley

Next Generation Wireless Local Area Networks

IEEE frame format

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

ECE 428 Computer Networks and Security

A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE

Wireless LAN Services for Hot-Spot

Wireless LAN Concepts

Wireless Local Area Networks and the Standard

Introduction to IEEE Wireless LAN

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

IEEE WIRELESS LAN STANDARD

Whitepaper n The Next Generation in Wireless Technology

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

How To Analyze The Security On An Ipa Wireless Sensor Network

Wi-Fi Capacity Analysis for ac and n: Theory & Practice

ECE/CS 372 introduction to computer networks. Lecture 13

Security in IEEE WLANs

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Arbitration. White Paper. September 2009 Version Author: Marcus Burton, CWNE #78 CWNP, Inc.

Department of Computer Science Columbia University

HIGH POWER WIRELESS N MINI USB ADAPTER K-300MWUN USER S MANUAL

Lecture 7 Multiple Access Protocols and Wireless

Networks. Master of Science (Computer Science and Engineering), December 2004, 45 pp.,

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

Protection Ripple in ERP WLANs White Paper

This chapter covers the following topics: Characteristics of roaming Layer 2 roaming Layer 3 roaming and an introduction to Mobile IP

CS263: Wireless Communications and Sensor Networks

An Investigation of the Impact of Signal Strength on Wi-Fi Link Throughput through Propagation Measurement. Eric Cheng-Chung LO

11/22/

TCOM 370 NOTES LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

The following sections describe the Gateway configuration pages in the SBG1000 Setup Program.

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Philippe Klein. avb-phkl qos-overview

Adaptive DCF of MAC for VoIP services using IEEE networks

COMP 3331/9331: Computer Networks and Applications

Getting Started with HP Wireless Networks. Version 10.41

Networking Test 4 Study Guide

Lecture 6.1 Introduction. Giuseppe Bianchi, Ilenia Tinnirello

User s Manual. Wireless LAN Access Point. Model No.: SP918GK

CWNA Instructor Led Course Outline

Video Transmission over Wireless LAN. Hang Liu

Measuring the service level in the 2.4 GHz ISM band

Getting the Most from Your Wireless Network

Wireless Local Area Networks (WLANs)

IEEE Ad Hoc Networks: Performance Measurements

IEEE a/ac/n/b/g Enterprise Access Points ECW5320 ECWO5320. Management Guide. Software Release v

Key Features. EnGenius Outdoor Base Station designs High Power, High Sensitivity and Strong Reliability Solutions under Harsh Environment.

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring Mike Freedman

WildPackets Guide to Wireless LAN Analysis

Wireless LAN Pen-Testing. Part I

Wireless LAN Access Point

Computer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

How To Configure the WLAN with QoS

Virtual Access Points

Networking: Certified Wireless Network Administrator Wi Fi Engineering CWNA

Chapter 5: Wireless Design Models, Topologies, and Infrastructure

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

VoIP in Mika Nupponen. S Postgraduate Course in Radio Communications 06/04/2004 1

Roaming, Handover, and Mobility

Data Center Networks, Link Layer Wireless (802.11)

Saturday, August 25, MUM Home INDIA Assignment 2012 Soumil Gupta Bhaya PROPRIETARY WIRELESS PROTOCOLS. N-Streme and Nv2

Getting the Most from Your Wireless Network

Data Link Protocols. Link Layer Services. Framing, Addressing, link access: Error Detection:

Transcription:

Wireless Networking Media Access Control Layer Standards Module-06 Jerry Bernardini Community College of Rhode Island CCRI J. Bernardini 1 REFERENCES LANs, 3rd Edition Chapter-6 CWTS Certified Wireless Technology Specialist Official Study Guide, Chapter-7 CWNA Certified Wireless Network Administration Official Study Guide (PWO-104), David Coleman, David Westcott, 2009, Chapter-7 The California Regional Consortium for Engineering Advances in Technological Education (CREATE) project CCRI J. Bernardini 2 1

Objectives Describe the three WLAN service sets Explain the features of MAC frames and MAC frame types Describe the MAC functions of discovering, joining, and transmitting on a WLAN 3 IEEE 802.11 Topologies or Operating Modes The purpose of 802.11 is to interconnect radio cards Every wireless device has a radio card All wireless devices are referred to as Stations (STA) Three topologies defined by 802.11 Service Sets Basic Service Set (BSS) Extended Service Set (ESS) Independent Basic Service Set (IBSS) Nonstandard Topologies Bridging, Repeating, Workgroup bridging Mesh networking (growing in importance) 10/8/2014 Wireless Networking J. Bernardini 4 2

Service Set Identifiers - SSID and BSSID SSID -Service Set Identifier is a 1-32 byte alphanumeric sequence that uniquely names an ESS (the network name). Any SSID or Null SSID is a blank SSID used to associate with anyone. BSSID- Basic Service Set Identifier is a 48-bits that uniquely identifies a BSS BSA Basic service Area Physical Coverage Area ESS Id = SSID Wired LAN AP BSS Id = BSSID Basic Independent Basic Service Set (IBSS) Independent Basic Service Set (IBSS): Wireless network that does not use an AP Wireless devices communicate between themselves Peer-to-peer or ad hoc mode BSS more flexible than IBSS in being able to connect to other wired or wireless networks IBSS useful for quickly and easily setting up wireless network When no connection to Internet or external network needed 6 3

Basic Service Set (BSS) BSS - The Basic Service Set is a term used to describe the collection of Stations which may communicate together within an 802.11 WLAN. Basic Service Set (BSS): Group of wireless devices served by single AP infrastructure mode BSS must be assigned unique identifier Service Set Identifier (SSID) Serves as network name for BSS Basic Service Area (BSA): Geographical area of a BSS Max BSA for a WLAN depends on many factors Dynamic rate shifting: As mobile devices move away from AP, transmission speed decreases 7 Extended Service Set (ESS) ESS - is comprised of a number BSS s ESS stations must have the same SSID The BSSID is the name of the BSS (not same as SSID) APs can be positioned so that cells overlap to facilitate roaming Wireless devices choose AP based on signal strength Stations going from one BSS to another will deal with Handoff Wired LAN ESS SSID BSS2 (BSSID2) BSS1 (BSSID1) BSS3 (BSSID3) 4

Extended Service Set and Mobile IP If STs move from one AP to another AP resides in a separate subnet a new IP address must be assigned Connectivity can be temporarily lost Running applications may have to be restarted Called Layer 3 roaming TCP/IP protocol support of mobile computing Computers given home address Static IP number on home network Home agent: Forwarding mechanism that keeps track of where mobile computer located When computer moves to foreign network, a foreign agent provides routing services Assigns computer a care-of address Computer registers care-of address with home agent 9 Mobile IP Components MN Mobile Node (VMD) FA Foreign Agent (MAP) HA Home Agent (MAP) AAP Authoritative Access Point MAP Mobile IP Access Point (MN) VMD Visiting Mobile Device (MN) COA Care-of-Address HAN Home Agent Network FAN Foreign Agent Network CN Correspondent Node CCRI J. Bernardini 10 5

Mobile IP Process - Discovery Mobile IP 3-Step Process 2 MN Mobile Node 1-Discovery 2-Registration 4 3 1 FA Foreign Agent HA Home Agent 3-Tunneling 1- Mobile Node (MN) gets address from Home Agent (HA) 2- MN moves to Foreign Agent (FA ) network 3- MN discovers FA or solicits for an agent. 4- MN gets Care-of-Address (COA) from FA CCRI J. Bernardini 11 Mobile IP Process - Registration Mobile IP 3-Step Process 1-Discovery 2-Registration 3-Tunneling 12 10 6 5 7 11 9 8 MN Mobile Node FA Foreign Agent HA Home Agent CN Correspondent Node 5- MN send registration request to FA 6- FA checks request, adds MN to pending list 7- FA relays request to HA 8- HA checks request and creates a mobile binding 9- HA sends registration reply to FA 10- FA checks reply and adds MN to visitor list and relays reply to MN 11-FA creates a routing entry and tunnel to HA 12- MN check reply and creates a tunnel to the HA Through the FA CCRI J. Bernardini 12 6

Mobile IP- Tunneling and Packet Forwarding MN Mobile Node 14 13 15 FA Foreign Agent HA Home Agent CN Correspondent Node COA- Care-of-Address 13- Correspondent Node (CN) sends packet to MN and is routed to HA 14- HA intercepts packets and tunnels to the FA using the COA 15- FA relays the packets to the MN CCRI J. Bernardini 13 Subnets and Mobile IP Subnets provide many advantages: make network management easier Subnets reduce broadcasts Subnets provide security Subnets use subnet masks (255.255.255.0) WLAN subnets creates problems for roaming devices Example: 192.146.118.20 /24 can seamlessly roam within 192.146.118.x /24 Note /24 is a 255.255.255.0 subnet mask 192.146.118.20 /24 can not seamlessly roam within 202.165.200.x /24 without changing the IP address Mobile IP offers a solution 192.146.118.20 can roam as a guest on the 202.165.200.x network CCRI J. Bernardini 14 7

Mobile IP -Explained With mobile IP, computers are given a home address (static IP number on home network) Home agent: forwarding mechanism that keeps track of where the mobile computer is located When the computer roams to another network (foreign network) a foreign agent provides routing services to the computer Foreign agent assigns a temporary IP number (known as care-of-address) Computer then registers the care-of-address with its home agent 15 Mobile IP (continued): Mobile IP (continued) When a frame is sent to computer s home address, the home agent intercepts the frame Encapsulates that frame into a new frame with the care-ofaddress as the destination address Redirects it to the foreign agent, which send it to the computer located on the foreign network Mobile IP enables a host to be identified by a single IP number even as it moves from one network to another 16 8

Distribution system (DS) Distribution system (DS): used by an AP to determine what communication needs to take place with other APs in the ESS or with the wired network Decides if it is necessary to exchange frames in their own BSSs, with a wired network, or to forward frames to another BSS Distribution system media: media that interconnects APs Wireless distribution system (WDS) - A wireless configuration that is used to connect APs 17 Medium Access Control Layer Frame Formats and Types IEEE has divided the Data Link Layer into two sublayers: Logical Link Control (LLC) sublayer: provides a common interface, reliability, and flow control Medium Access Control (MAC) sublayer: appends physical addresses to the frame Functions performed at the MAC sublayer involve different frame formats and types There are three main types of MAC frames: Management frames Control frames Data frames Ethernet one frame type 18 9

MAC Frame Formats OSI model uses the term data unit to describe sets of data that move through the OSI layers Service Data Unit (SDU): specific unit of data that has been passed down from a higher OSI layer to a lower layer but has not yet been encapsulated by that lower layer Protocol Data Unit (PDU): specifies that data will be sent to the peer protocol layer at the receiving device Changing an SDU to a PDU involves an encapsulation process in which the lower layer adds headers and footers 19 MAC Frame Formats Process in a 802.11 network using SDUs and PDUs: Layer 3 send data to LLC sublayer of Layer 2. Unit of data is called the MAC Service Data Unit (MSDU) LLC sends data unit to MAC sublayer where MAC header information is added. Data unit is now called MAC Protocol Data Unit (MPDU) also known as frame MPDU is sent to PLCP sublayer in the Physical Layer and is then called the PLCP Service Data Unit (PSDU) PSDU is passed to the PMD sublayer that creates the PLCP Protocol Data Unit (PPDU) by adding header/footer PPDU is then transmitted as a series of bits 20 10

SDUs and PDUs LANs, Third Edition 21 MAC Frame Formats Aggregate MAC Service Data Unit (A-MSDU): allows multiple MSDUs to be combined Aggregate MAC Protocol Data Unit (A-MPDU): allows multiple MPDUs to be combined Figure 6-9 A-MSDU and A-MPDU 22 11

Ethernet and 802.11 Frames Ethernet Frame 1518 7 1 6 6 2 46-1500 4 Preamble Source Destination Data FCS Start Of Frame Wireless Frame 10 or 18 Sync Type or Length Field 2 4 or 6 PLCP Header Start Of Frame 2 2 6 6 6 2 6 0-2304 4 Source Destination Rec. Adr Trans. Adr Data FCS Duration ID Frame Cntrl MAC Packet DATA Unit, (MPDU) Sequence Cntrl Management Frames Beacon Frame Probe Frames Association Frames more Control Frames Frame Categories / Types RTS and CTS Frames ACK Acknowledgement Frames more Data Frames Data Payload Frames 12

IEEE 802.11 Frame Formats Management Frame Control (2) Duration (2) Des. Address (6) Source Address (6) BSSID (6) Seq. Control (2) Frame Body ( 1 to 2311) Frame Check Seq. (6) Control Frame Control (2) Duration (2) Receiver Address (6) Transmit Address ( 6) Frame Check Seq. (6) Data Frame Control (2) Duration (2) Address 1 (6) Address 2 (6) Address 3 (6) Seq. Control (2) Address 4 (6) Data ( 1 to 2311) Frame Check Seq. (6) (Bytes per field) LANs, Second Edition 25 Twelve Management Frame Types 10/8/2014 Wireless Networking J. Bernardini 26 13

802.11 Beacons Beacon information frame sent by an AP every 100 ms Beacon frames are approximately 50-bytes with the following information: Timestamp Beacon Interval Capability Info Service Set Identifier Support Rates Parameter Sets Traffic Indication Map Header Payload Trailer Beacon Frame Eight Control Frames Used to assist with the delivery of data frames 10/8/2014 Wireless Networking J. Bernardini 28 14

Fifteen Data Frames The frames that actually carry application data 10/8/2014 Wireless Networking J. Bernardini 29 Protocol Data Unit (PDU) MTU and Fragmentation Frames have different MTUs and may require fragmentation Frame Type and Vendor Support MTU (Bytes) TCP Transport maximum segment size 1460 IP Layer-3 default size 1500 MTU + Overhead (Bytes) MAC IEEE 802.3 Ethernet default 1500 1518 MPDU IEEE 802.11 default 1534 MPDU IEEE 802.11 maximum 2304 MAC Jumbo Frame >1500 MAC Cisco Baby giant 1552 1600 A-MPDU IEEE 802.11 Aggregate Service Unit 7935 MAC Cisco Catalyst 4000 9198 9216 MAC Cisco Catalyst 6000 9216 9234 10/8/2014 Wireless Networking J. Bernardini 30 15

IEEE 802.11 MAC Functions Main Functions Discovering a WLAN - Joining the WLAN - Transmitting on a WLAN Scanning- discover AP or BSS Synchronization- all stations have the same clock Frame Transmission- rules for frame transfer Authentication-allow device in network Association-after authentication associate with AP Reassociation-roaming and association with new AP Data Protection-data encryption protects data Power Management-save power by sleeping transceiver Fragmentation-breakup frame for efficiency and interfer. RTS/CTS- solution to hidden node problem 10/8/2014 Wireless Networking J. Bernardini 31 Beacon Management Frame A special management frame that is used by a client stations seeking a wireless network to join. Instead of beacon frames a station could use probe request and probe response frames In an ad hoc (IBSS ) wireless network all stations take turns broadcasting the beacon frame Beacon Beacon S1 S2 AP Control Point 10/8/2014 Wireless Networking J. Bernardini 32 16

Passive Scanning (Beacons) 1. Client stations listens for a beacon from an access point (AP) 2. If multiple beacons are received the strongest one is selected 3. The listening station then requests authentication and association S1 Beacons Beacons AP Control Point S2 10/8/2014 Wireless Networking J. Bernardini 33 Active Scanning (Probes) A station could use probe request and probe response frames Instead of beacon frames 1. Station is configured with SSID and switched to a channel 2. Probe request sent by requesting station 3. All stations that have the same SSID and have normal configurations respond with a Probe Response frame The process also involves waiting for ProbeDelay and MinChannel Timers S1 Probe Request AP Control Point Probe Response S2 10/8/2014 Wireless Networking J. Bernardini 34 17

Wireless Connection Process Authentication is the process used by a station to: verify that another station is approved for communications. this is a station authentication and not a user authentication. Authentication Step Two IEEE 802.11 standards: Open System Authentication Shared Key Authentication 2-Step Connection Process Authentication Phase Association Phase Authentication Phase Association Phase IEEE 802.11 Connection State Machine Unauthenticated and Unassociated Successful Authentication De-authentication Notification Authenticated and Unassociated Successful Association Disassociation Notification Authenticated and Associated De-authentication Notification 18

Unauthenticated & Unassociated In the first state: Wireless Client/Node is not connected to the network. Wired LAN Access Points Wireless Client Authenticated & Unassociated In the Second State: Wireless Client/Node has passed the authentication process but is not associated with the AP. Wired LAN Association Response Access Points Association Request Wireless Client 19

In the Third State: Authenticated & Associated Wireless Client/Node is now connected and associated with the AP. Data can now be transferred between the devices. Wired LAN Access Points Data Link Wireless Client Open System Authentication Open System / Null Authentication IEEE 802.11 Default Authentications based on empty string SSID Client sends empty string SSID Receiving station, (AP) sends acknowledgment Wired LAN Authentication Management Frame - SSID Wireless Client ACK Authentication Management Frame ACK Access Points 20

Shared Key Authentication Wired LAN Authentication Management Frame - SSID Challenge Phrase Encrypted Phrase Access Points Wireless Client Authentication WEP Key Secure Channel WEP Key Roaming Roaming - The process of a client moving seamlessly from one area or cell to another while maintaining a data link. Wired LAN Access Points 1 2 1 1 Wireless Clients Usually a 20%-30% cell overlap 21

Transmitting on the WLAN IEEE 802.11 specifies three procedures for transmitting on the WLAN: Distributed coordination function Point coordination function Hybrid coordination function 43 MAC Layer Access Methods Communications Options DCF RTS/CTS (optional) Distributed function Wireless MAC Avoids hidden node problem DCF PCF (optional) AP polls stations Superframes to allow station to eventually get access Superframe = Beacon + CFP + CP CFP = Contention-Free Period CP = Contention Period 22

RTS/CTS Sending unicast packets Station can send RTS with reservation parameter after waiting for DIFS (reservation determines amount of time the data packet needs the medium) Acknowledgement via CTS after SIFS by receiver (if ready to receive) Sender can now send data at once, acknowledgement via ACK Other stations store medium reservations distributed via RTS and CTS MAC Frame Formats Due to significant differences between highthroughput (HT) 802.11n and non-ht 802.11a/b/g, an AP can tell 802.11n devices to change to one of four HT Operation Modes: HT Greenfield Mode (Mode 0) HT Nonmember Protection Mode (Mode 1) HT 20 MHz Protection Mode (Mode 2) HT Mixed Mode (Mode 3) 46 23

Distributed Coordination Function The Distributed Coordination Function (DCF) is the fundamental access mechanism in IEEE 802.11 Medium Access Control (MAC). DCF can be used in all wireless topologies: IBSS, BSS, and ESS. Distributed Coordination Function (DCF) Distributed coordination function (DCF) defines two procedures: Carrier Sense Multiple Access with Collision Detection and Request to Send/Clear to Send Channel access methods: Rules for cooperation among wireless devices Contention: Computers compete to use medium If two devices send frames simultaneously, collision results and frames become unintelligible Must take steps to avoid collisions 48 24

Distributed Coordination Function (DCF) Carrier Sense Multiple Access with Collision Detection (CSMA/CD): Before networked device sends a frame, listens to see if another device currently transmitting If traffic exists, wait; otherwise send Devices continue listening while sending frame If collision occurs, stops and broadcasts a jam signal CSMA/CD cannot be used on wireless networks: Difficult to detect collisions Hidden node problem (when stations are out of range of each other) 49 Distributed Coordination Function (DCF) Distributed Coordination Function (DCF): Specifies modified version of CSMA/CD Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) Attempts to avoid collisions altogether Time when most collisions occur is immediately after a station completes transmission All stations must wait random amount of time after medium clear Slot time 50 25

Distributed Coordination Function (DCF) CSMA/CA also reduces collisions via explicit frame acknowledgment Acknowledgment frame (ACK): Sent by receiving device to sending device to confirm data frame arrived intact If ACK not returned, transmission error assumed IEEE 802.11n adds a feature known as block acknowledgment Supports multiple MPDUs in an A-MPDU CSMA/CA does not eliminate collisions Does not solve hidden node problem 51 Distributed Coordination Function (DCF) Request to Send/Clear to Send (RTS/CTS) protocol: Option used to solve hidden node problem Also known as virtual carrier sensing Significant overhead upon the WLAN with transmission of RTS and CTS frames Especially with short data packets RTS threshold: Only packets that are longer than RTS threshold are transmitted using RTS/CTS 52 26

Distributed Coordination Function (DCF) Fragmentation: Divide data to be transmitted from one large frame into several smaller ones Reduces probability of collisions Reduces amount of time medium is in use If data frame length exceeds specific value, MAC layer fragments it Receiving station reassembles fragments Alternative to RTS/CTS High overhead ACKs and additional SIFS time gaps 53 Distributed Coordination Function (DCF) Variations of RTS/CTS are used as protection mechanisms: CTS-to-self: process used when 802.11g devices are mixed with 802.11b devices HT Dual-CTS Protection: used with 802.11n devices in a mixed environment with 802.11a/b/g devices 802.11n devices sends a RTS to the AP, which responds with two CTS frames: one in 802.11n format and one in non-802.11n format HT L-SIG Protection: used with 802.11n devices in a mixed environment 54 27

Distributed Coordination Function (DCF) Interframe spaces (IFS): Intervals between transmissions of data frames Short IFS (SIFS): For immediate response actions such as ACK Point Coordination Function IFS (PIFS): Time used by a device to access medium after it has been asked and then given approval to transmit Distributed Coordination Function IFS (DIFS): Standard interval between transmission of data frames 55 Distributed Coordination Function (DCF) Interframe spaces (IFS) continued: Extended IFS: used when frames must be retransmitted Arbitration IFS: used when setting priorities to different types of transmissions Reduced IFS: reduces amount of dead space required between OFDM transmissions 56 28

Point Coordination Function (PCF) Polling: Channel access method in which each device asked in sequence if it wants to transmit Effectively prevents collisions Point Coordination Function (PCF): AP serves as polling device or point coordinator Point coordinator has to wait only through point coordination function IFS (PIFS) time gap Shorter than DFIS time gap 57 Point Coordination Function (PCF) If point coordinator hears no traffic after PIFS time gap, sends out beacon frame Field to indicate length of time that PCF (polling) will be used instead of DCF (contention) Receiving stations must stop transmission for that amount of time Point coordinator then sends frame to specific station, granting permission to transmit one frame 802.11 standard allows WLAN to alternate between PCF (polling) and DCF (contention) 58 29

Hybrid Coordination Function (HCF) Hybrid Coordination Function (HCF): allows for different types of wireless traffic to be given different levels of priority Enhanced Distributed Channel Access (EDCA): Contentionbased but supports different types of traffic Four access categories (AC) Provides relative QoS but cannot guarantee service Hybrid Coordination Function Controlled Channel Access (HCCA): based upon polling Serves as a centralized scheduling mechanism 59 Timing Diagrams Event Timing or Sequence Diagrams - A graph showing events/levels as a function of time. Event 2ms 4ms 6ms 8ms 10ms Time tp1 sync mxc rst ack data A Time flag en tp2 data pd Time 30

SIFS SIFS - Shortest and highest priority time space sent before and/or after RTS, CTS, and ACK frames. For DSSS, SIFS is 10 microseconds or 10 S. sender DIFS data receiver SIFS ACK others DIFS DIFS data deferring mode contention waiting time PIFS PIFS Are used only in Point Coordination Mode by the APs. This mode is enabled by the administrator. It has medium priority and therefore always wins over DIFS, so that the AP can take control in polling. For DSSS, PIFS is 30 S. 31

Distributed Coordination Function The Distributed Coordination Function (DCF) is the fundamental access mechanism in IEEE 802.11 Medium Access Control (MAC). DCF can be used in all wireless topologies: IBSS, BSS, and ESS. DIFS DIFS Is used by default on all 802.11 stations. DIFS is the lowest priority and is used for data and management frames. For DSSS, DIFS is 50 s. DIFS PIFS Station Backoff Timers sender DIFS medium busy SIFS contention frame A look at all three: 10 s, 30 s, 50 s, for DSSS. 32

Hidden Node Wireless Client 1 2 Wireless Client Access Points 65 Hidden Node Detection and Solution Symptoms Increase corruption Increased retransmission Use protocol analyzer near to the AP and count corrupted frames Use protocol analyzer near to the STA and count retransmission frames Solutions Use RTS/RTS Increase STA power Remove obstacles and move STA if possible APs and STA at same IEEE 802.11h power level 66 33

Protection Mechanisms Protection Mechanisms allow for backward compatibility Older technology and newer technology compatibility Two Broad Categories of protection mechanism Extended rate physical (ERP) High throughput (HT) 10/8/2014 Wireless Networking J. Bernardini 67 Review 802.11g Protection Before an 802.11g client can transmit to an 802.11g AP it must reserve the medium. Must transmit so 802.11b will understand. Two Protection Methods CTS-to self at 802.11b modulation (slow Clear to Send) RTS-CTS at 802.11b modulation CTS-to-self is more efficient but may not be seen by hiddennode RTS-CTS is more reliable but has more overhead Both Methods dramatically reduce the 802.11g throughput CCRI J. Bernardini 68 34

802.11b/g Mixed Mode Operation Station80 2.11g Station80 2.11g AP 802.11g Station80 2.11b 1-Slow CTS 2-Slow CTS 3-Fast Data 3-Fast Data 2-Slow CTS 3-Fast Data CCRI J. Bernardini 69 802.11 Summary Characteristics Protocol Release Date Op. Frequency Throughput (Typical) Data Rate (Max) Modulation Technique Range (Radius Indoor) Depends, # and type of walls Range (Radius Outdoor) Loss includes one wall 802.11a 1999 5 GHz 23 Mbps 54 Mbps OFDM ~35 Meters ~120 Meters 802.11b 1999 2.4 GHz 4.3 Mbps 11 Mbps DSSS -CCK ~38 Meters ~140 Meters 802.11g 2003 2.4 GHz 19 Mbps 54 Mbps OFDM & DSSS ~38 Meters ~140 Meters 802.11n June 2010 2.4 GHz 5 GHz 74 Mbps 248 Mbps OFDM MIMO ~70 Meters ~250 Meters CCK-Complementary Code Keying OFDM-Orthogonal Frequency Division Multiplexing DSSS-Direct Sequence Spread Spectrum MIMO-Multi-Input Multi-Output CCRI J. Bernardini 70 35

HT Mode Non-HT Legacy Mandatory for 802.11n Only 20 MHz channels Same format as 802.11ag HT Mixed Two part preamble First part can be decoded by 802.11ag Second part can not be decoded by 802.11ag HT Greenfield Preamble can not be decoded by 802.11ag Can use both 20 MHz and 40 MHz channels 10/8/2014 Wireless Networking J. Bernardini 71 Dynamic Rate Switching Dynamic Rate Switching =Dynamic Rate Selection =Automatic Rate Shifting----All mean the same thing Process of reducing or increasing the data rate based upon RF signal levels RF signals attenuate over distance or by absorption AP will reduce data rate for weaker signals AP will increase data rate for higher signals Data Rate (Mb/sec) Received Signal (dbm) 6 82 9 81 12 79 18 77 24 74 36 70 48 66 54 65 10/8/2014 Wireless Networking J. Bernardini 72 36

Data Rate Coverage Areas -85 dbm -76 dbm -72 dbm 24 Mbps 18 Mbps 9 Mbps Summary A Basic Service Set (BSS) is defined as a group of wireless devices that is served by a single access point (AP) An Extended Service Set (ESS) is comprised of two or more BSS networks that are connected through a common distribution system An Independent Basic Service Set (IBSS) is a wireless network that does not use an access point A Service Data Unit (SDU) is a specific unit of data passed down from a higher OSI layer A Protocol Data Unit (PDU) specifies data that will be sent to the peer layer at the receiving device 74 37

Summary Because of the differences between 802.11n HT and non-ht 802.11a/b/g devices an AP can tell 802.11n devices to change to one of four HT Operation Modes in order to interoperate Three main types of MAC frames: management frames, control frames, and data frames WLAN discovery can be done by passive scanning or active scanning Passive scanning depends on the AP advertising itself Active scanning station send out a management probe request on an available channel 75 Summary Once a wireless device has discovered the WLAN, it requests to join the network; This is a twofold process known as authentication and association The IEEE 802.11 standard specifies three procedures for transmitting on the WLAN, distributed coordination function (DCF), point coordination function (PCF), and hybrid coordination function (HCF) 76 38