Sie sind auf Seite 1von 43

Chapter 8

Wireless LAN
IEEE 802.11
IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the
physical and data link layers.

Topics discussed in this section:

Architecture
MAC Sublayer
Physical Layer

ALL RIGHTS RESERVED


No part of this document may be reproduced without written approval from Limkokwing University of Creative Technology Worldwide
Note

A BSS without an AP is called an ad hoc network;


a BSS with an AP is called an infrastructure network.

ALL RIGHTS RESERVED


No part of this document may be reproduced without written approval from Limkokwing University of Creative Technology Worldwide
Basic service sets (BSSs)

ALL RIGHTS RESERVED


No part of this document may be reproduced without written approval from Limkokwing University of Creative Technology Worldwide
Extended service sets (ESSs)

ALL RIGHTS RESERVED


No part of this document may be reproduced without written approval from Limkokwing University of Creative Technology Worldwide
WLAN Topology
Same as Ethernet
Use the same radio • Physical star
frequencies, so • Logical bus
take turns using
the network

10Base-T or
100Base-T

Uses a NIC that


transmits radio A wireless Access Point (AP)
signals to the AP connected into an Ethernet Switch

ALL RIGHTS RESERVED


No part of this document may be reproduced without written approval from Limkokwing University of Creative Technology Worldwide
Components of WLANs
• Network Interface Cards

– Available for laptops as PCMCIA cards

– Available for desktops as standard cards

– Many laptops come with WLAN cards built in

– About 30 -153 meters max transmission range

• Access Points (APs)

– Used instead of hubs; act as a repeater

• Must hear all computers in WLAN

– Message transmitted twice

» Sender to AP, then AP to receiver

ALL RIGHTS RESERVED


No part of this document may be reproduced without written approval from Limkokwing University of Creative Technology Worldwide
More on the APs and NICs
• 3 separate channels available for 802.11b (1, 6 & 11)
– All devices using an AP must use the same channel
• WLAN functions as a shared media LAN
– Reduces the interference
– Users can roam from AP to AP
• Initially NIC selects a channel (thus an AP)
– Based on “strength of signal” from an AP
• During roaming, if NIC sees another AP with a stronger signal, attaches itself to this
AP
• Usually a set of APs installed to provide geographical coverage and meet traffic needs
– NICs selects a less busy channel if its current channel becomes busy (too many users)

ALL RIGHTS RESERVED


No part of this document may be reproduced without written approval from Limkokwing University of Creative Technology Worldwide
Antennas used in WLANs
• Omni directional antennas

– Transmit in all directions simultaneously

– Used on most WLANs

• Dipole antenna (rubber duck)

– Transmits in all direction (vertical, horizontal, up, down)

• Directional antennas

– Project signal only in one direction

• Focused area; stronger signal; farther ranges

– Most often used on inside of an exterior wall

• To reduce the security issue

– A potential problem with WLANs

ALL RIGHTS RESERVED


No part of this document may be reproduced without written approval from Limkokwing University of Creative Technology Worldwide
CSMA/CA and NAV

DIFS (Distributed InterframeSpace)

SIFS (Short Interframe space)

RTS frame - the duration of time that it needs to occupy the channel.
ALL RIGHTS RESERVED
No part of this document may be reproduced without written approval from Limkokwing University of Creative Technology Worldwide
How CSMA/CA works?
• DIFS (Distributed Interframe Space) - After the station is found to be idle, the station
waits for a period time (DIFS)

• RTS (Request to send) – The station sends a ctrl frame RTS.

• SIFS (Short Interframe space) – After receiving the RTS and a waiting period of time.

• CTS (Clear to send) – Destination station send ctrl frame RR.

• The source station sends data send data after waiting an amount of time equal to SIFS.

• The destination station, after waiting an amount of time equal to SIFS sends an
acknowledgement.

ALL RIGHTS RESERVED


No part of this document may be reproduced without written approval from Limkokwing University of Creative Technology Worldwide
How NAV (Network Allocation Vector) works?
• When a station sends RTS frame, it includes the duration of time that it needs to occupy
the channel.

• The stations that are affected by this transmission create a timer called NAV that shows
how much time pass before these stations are allowed to check for the channel for
idleness.

• Each time a station accesses the system and send RTS frame, other stations start their
NAV.

ALL RIGHTS RESERVED


No part of this document may be reproduced without written approval from Limkokwing University of Creative Technology Worldwide
Example of repetition interval

ALL RIGHTS RESERVED


No part of this document may be reproduced without written approval from Limkokwing University of Creative Technology Worldwide
Frame format

ALL RIGHTS RESERVED


No part of this document may be reproduced without written approval from Limkokwing University of Creative Technology Worldwide
Subfields in FC field

ALL RIGHTS RESERVED


No part of this document may be reproduced without written approval from Limkokwing University of Creative Technology Worldwide
Control frames

ALL RIGHTS RESERVED


No part of this document may be reproduced without written approval from Limkokwing University of Creative Technology Worldwide
Values of subfields in control frames

ALL RIGHTS RESERVED


No part of this document may be reproduced without written approval from Limkokwing University of Creative Technology Worldwide
Hidden station problem

ALL RIGHTS RESERVED


No part of this document may be reproduced without written approval from Limkokwing University of Creative Technology Worldwide
Note
The CTS frame in CSMA/CA handshake
can prevent collision from
a hidden station.

ALL RIGHTS RESERVED


No part of this document may be reproduced without written approval from Limkokwing University of Creative Technology Worldwide
Use of handshaking to prevent hidden station problem

ALL RIGHTS RESERVED


No part of this document may be reproduced without written approval from Limkokwing University of Creative Technology Worldwide
Physical layers

ALL RIGHTS RESERVED


No part of this document may be reproduced without written approval from Limkokwing University of Creative Technology Worldwide
Industrial, scientific, and Medical (ISM) band

ALL RIGHTS RESERVED


No part of this document may be reproduced without written approval from Limkokwing University of Creative Technology Worldwide
Bluetooth
Bluetooth is a wireless LAN technology designed to connect devices of different functions
such as telephones, notebooks, computers, cameras, printers, coffee makers, and so on. A
Bluetooth LAN is an ad hoc network, which means that the network is formed spontaneously.

Topics discussed in this section:

Architecture
L2CAP

ALL RIGHTS RESERVED


No part of this document may be reproduced without written approval from Limkokwing University of Creative Technology Worldwide
Architecture
• Two types of architectures: Piconet and scatternet

• Piconet/Smallnet – Can have up to 8 stations. One – Primary and the rest are secondary's.
One to many relationship.

• Scatternet – Piconets can be combined to form scatternet.

• A secondary station in piconet can be primary in another piconet. This station can receive
message from the primary in the first piconet(as a secondary) and acting as a primary,
deliver them to secondaries in the second piconet. A station can be a member of two
piconets.

ALL RIGHTS RESERVED


No part of this document may be reproduced without written approval from Limkokwing University of Creative Technology Worldwide
Piconet

ALL RIGHTS RESERVED


No part of this document may be reproduced without written approval from Limkokwing University of Creative Technology Worldwide
Scatternet

ALL RIGHTS RESERVED


No part of this document may be reproduced without written approval from Limkokwing University of Creative Technology Worldwide
Single-secondary communication

In slot 0 – the primary sends and secondary receives.


In slot 1 – the secondary sends and primary receives.

ALL RIGHTS RESERVED


No part of this document may be reproduced without written approval from Limkokwing University of Creative Technology Worldwide
Single-Secondary Communication
• Bluetooth hops 1600times per second. Therefore each devices changes its modulation
frequency 1600 times per second.

• A device uses a frequency for only 625µs (1/600s) before it hops to another
frequency.

• If the piconet has only one secondary, TDMA operation is very simple. The time is
divided into slots of 625µs.

ALL RIGHTS RESERVED


No part of this document may be reproduced without written approval from Limkokwing University of Creative Technology Worldwide
Multiple-secondary communication

In slot 0 – the primary sends and secondary 1 receives.


In slot 1 – the secondary 1 sends and primary receives – other secondaries
are silent.
In slot 2 – The primary sends a frame to secondary 2.
In slot 3 – only sec. 2 sends a frame to primary because the previous frame
Was addressed to sec. 2. Other sec. are silent.
ALL RIGHTS RESERVED
No part of this document may be reproduced without written approval from Limkokwing University of Creative Technology Worldwide
Best Practice Recommendations

• Adopt 802.11g
– Will replace 802.11b and .11a
– Prices of .11g NICs and APs coming down
• Wireless vs. Wired
– 802.11g ~ 10Base-T
• Similar data rates for low traffic environment
• When mobility important  802.11g
• Using WLAN as overlay network (over wired LAN)
– WLANs installed In addition to wired LANs
– To provide mobility for laptops, etc.,
– To provide access in hallways, lunch rooms, etc.,

ALL RIGHTS RESERVED


No part of this document may be reproduced without written approval from Limkokwing University of Creative Technology Worldwide
Physical WLAN Design
• More challenging than designing a traditional LAN

– Placement of APs: Locations chosen to:

• Provide coverage

• Minimize potential interference

• Begins with a site survey to determine

– Feasibility of desired coverage

• Measuring the signal strength from temporary APs

– Potential sources of interference

• Most common source: Number and type of walls

– Locations of wired LAN and power sources

– Estimate of number of APs required

ALL RIGHTS RESERVED


No part of this document may be reproduced without written approval from Limkokwing University of Creative Technology Worldwide
Physical WLAN Design
• Begin locating APs

– Place an AP in one corner

– Move around measuring the signal strength

– Place another AP to the farthest point of coverage

• AP may be moved around to find best possible spot

• Also depends on environment and type of antenna

– Repeat these steps several times until the corners are covered

– Then begin the empty coverage areas in the middle

• Allow about 15% overlap in coverage between APs

– To provide smooth and transparent roaming

• Set each AP to transmit on a different channel

ALL RIGHTS RESERVED


No part of this document may be reproduced without written approval from Limkokwing University of Creative Technology Worldwide
WLAN Security
• Especially important for wireless network

– Anyone within the range can use the WLAN

• Finding a WLAN

– Move around with WLAN equipped device and try to pick up the signal

– Use special purpose software tools to learn about WLAN you discovered

• Wardriving – this type exploration

• Warchalking – writing symbols on walls to indicate presence of an unsecure


WLAN

ALL RIGHTS RESERVED


No part of this document may be reproduced without written approval from Limkokwing University of Creative Technology Worldwide
Types of WLAN Security
• Service Set Identifier (SSID)
– Required by all clients to include this in every packet
– Included as plain text Easy to break
• Wired Equivalent Privacy (WEP)
– Requires that user enter a key manually (to NIC and AP)
– Communications encrypted using this key
– Short key (40-128 bits)  Easy to break by “brute force”
• Extensible Authentication Protocol (EAP)
– WEP keys created dynamically after correct login
• Requires a login (with password) to a server
– After logout, WEP keys discarded by the server
• Wi-Fi Protected Access (WPA) – new standard
– A longer key, changed for every packet

ALL RIGHTS RESERVED


No part of this document may be reproduced without written approval from Limkokwing University of Creative Technology Worldwide
Improving WLAN Performance

• Similar to improving wired LANs

– Improving device performance

– Improving wireless circuit capacity

– Reducing network demand

ALL RIGHTS RESERVED


No part of this document may be reproduced without written approval from Limkokwing University of Creative Technology Worldwide
Improving WLAN Performance
• Similar to improving wired LANs
– Improving device performance
• If 802.11g widely deployed, replace 802.11b cards with .11g cards (may be the cause
for slow performance)
• By high-quality cards and APs
– Improving wireless circuit capacity
• Upgrade to 802.11g
• Reexamine placement of APs
• Check sources of interference (other wireless devices operating in the same
frequencies))
• Use different type of antennas
– Reducing network demand

ALL RIGHTS RESERVED


No part of this document may be reproduced without written approval from Limkokwing University of Creative Technology Worldwide
Improving WLAN Device Performance

– If 802.11g widely deployed, replace 802.11b cards with .11g cards

• May be the cause for slow performance

– By high-quality cards and APs

• Better design

• Stronger signals,

• Longer ranges

ALL RIGHTS RESERVED


No part of this document may be reproduced without written approval from Limkokwing University of Creative Technology Worldwide
Improving Wireless Circuit Capacity
• Upgrade to 802.11g

• Re-place APs

– Fewest walls between AP and devices

– Ceiling or high mounted to minimize obstacles

– On halls, not in closets

• Remove sources of interference

– Other wireless devices operating in the same frequencies

• Bluetooth devices, cordless phones, etc.

• Use different type of antennas

– Directional antennas in smaller range to get stronger signals (faster throughput)

ALL RIGHTS RESERVED


No part of this document may be reproduced without written approval from Limkokwing University of Creative Technology Worldwide
Reducing WLAN Demand

• Never place a server in a WLAN

– Doubles the traffic between clients and server

• Since all communications is through the AP

– Locate the server in the wired part of the network (ideally with a switched LAN)

• Place wired LAN jacks in commonly used locations

– If WLAN becomes a problem, users can switch to wired LAN easily

ALL RIGHTS RESERVED


No part of this document may be reproduced without written approval from Limkokwing University of Creative Technology Worldwide
Implications for Management
• WLANs becoming common place

– Access to internal data, any time, any place

• Better protection of corporate networks

– Public access through WLAN hotspots

• Competition with cell phone technologies

– New cell phone technologies (faster, longer ranges)

– Drastic price drops of WLAN devices

• Widespread Internet access via multiplicity of devices (PDAs, etc,)

– Development of new Internet applications

• New companies created; some old ones out of business

– Drastic increase in the amount of data flowing around

ALL RIGHTS RESERVED


No part of this document may be reproduced without written approval from Limkokwing University of Creative Technology Worldwide
References

These slides are taken from Copyright 2006 John Wiley & Sons, Inc.

ALL RIGHTS RESERVED


No part of this document may be reproduced without written approval from Limkokwing University of Creative Technology Worldwide
Sub Point #1
Wireless LAN
Architecture

Sub Point #4
Implication for KEY Sub Point #2
Addressing
Management
POINTS Mechanisms

Sub Point #3
Wireless LAN
Security

ALL RIGHTS RESERVED


No part of this document may be reproduced without written approval from Limkokwing University of Creative Technology Worldwide
End of Lecture

ALL RIGHTS RESERVED


No part of this document may be reproduced without written approval from Limkokwing University of Creative Technology Worldwide

Das könnte Ihnen auch gefallen