IEEE 802.11 v2.0
-
Upload
prabha-karan-murugadoss -
Category
Documents
-
view
244 -
download
0
Transcript of IEEE 802.11 v2.0
-
7/28/2019 IEEE 802.11 v2.0
1/15
IEEE 802.11
IEEE 802.11 is a set of standards for implementing wireless local area network(WLAN)
computer communication in the 2.4, 3.6, 5 and 60 GHz frequency bands. They are created andmaintained by the IEEE LAN/MAN Standards Committee (IEEE 802). The base version of the
standard was released in 1997 and has had subsequent amendments. These standards provide thebasis for wireless network products using the Wi-Fibrand.
General description
The 802.11 family consist of a series of half-duplex over-the-airmodulation techniques
that use the same basic protocol. The most popular are those defined by the 802.11b and 802.11gprotocols, which are amendments to the original standard. 802.11-1997 was the first wireless
networking standard, but 802.11a was the first widely accepted one, followed by 802.11b and
802.11g. 802.11n is a new multi-streaming modulation technique. Other standards in the family(cf, h, j) are service amendments and extensions or corrections to the previous specifications.
802.11b and 802.11g use the 2.4 GHz ISM band, operating in the United States underPart 15 of the US Federal Communications Commission Rules and Regulations. Because of this
choice of frequency band, 802.11b and g equipment may occasionally suffer interference from
microwave ovens, cordless telephones and Bluetooth devices. 802.11b and 802.11g control their
interference and susceptibility to interference by using direct-sequence spread spectrum (DSSS)and orthogonal frequency-division multiplexing (OFDM) signaling methods, respectively.
802.11a uses the 5 GHz U-NII band, which, for much of the world, offers at least 23 non-
overlapping channels rather than the 2.4 GHz ISM frequency band, where adjacent channels
overlap - see list of WLAN channels. Better or worse performance with higher or lowerfrequencies (channels) may be realized, depending on the environment.
The segment of the radio frequency spectrum used by 802.11 varies between countries. In
the US, 802.11a and 802.11g devices may be operated without a license, as allowed in Part 15 of
the FCC Rules and Regulations. Frequencies used by channels one through six of 802.11b and802.11g fall within the 2.4 GHz amateur radio band. Licensed amateur radio operators may
http://en.wikipedia.org/wiki/Wireless_LANhttp://en.wikipedia.org/wiki/IEEE_802.11y-2008http://en.wikipedia.org/wiki/IEEE_802.11adhttp://en.wikipedia.org/wiki/Institute_of_Electrical_and_Electronics_Engineershttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Metropolitan_area_networkhttp://en.wikipedia.org/wiki/IEEE_802http://en.wikipedia.org/wiki/Wi-Fihttp://en.wikipedia.org/wiki/Half-duplexhttp://en.wikipedia.org/wiki/Modulationhttp://en.wikipedia.org/wiki/Hertzhttp://en.wikipedia.org/wiki/ISM_bandhttp://en.wikipedia.org/wiki/Part_15_%28FCC_rules%29http://en.wikipedia.org/wiki/Federal_Communications_Commissionhttp://en.wikipedia.org/wiki/Interference_%28communication%29http://en.wikipedia.org/wiki/Microwave_ovenhttp://en.wikipedia.org/wiki/Cordless_telephonehttp://en.wikipedia.org/wiki/Bluetoothhttp://en.wikipedia.org/wiki/Direct-sequence_spread_spectrumhttp://en.wikipedia.org/wiki/Orthogonal_frequency-division_multiplexinghttp://en.wikipedia.org/wiki/U-NIIhttp://en.wikipedia.org/wiki/List_of_WLAN_channelshttp://en.wikipedia.org/wiki/Radio_frequencyhttp://en.wikipedia.org/wiki/Amateur_radiohttp://en.wikipedia.org/wiki/File:WRT54G_v2_Linksys_Router_Digon3.jpghttp://en.wikipedia.org/wiki/Amateur_radiohttp://en.wikipedia.org/wiki/Radio_frequencyhttp://en.wikipedia.org/wiki/List_of_WLAN_channelshttp://en.wikipedia.org/wiki/U-NIIhttp://en.wikipedia.org/wiki/Orthogonal_frequency-division_multiplexinghttp://en.wikipedia.org/wiki/Direct-sequence_spread_spectrumhttp://en.wikipedia.org/wiki/Bluetoothhttp://en.wikipedia.org/wiki/Cordless_telephonehttp://en.wikipedia.org/wiki/Microwave_ovenhttp://en.wikipedia.org/wiki/Interference_%28communication%29http://en.wikipedia.org/wiki/Federal_Communications_Commissionhttp://en.wikipedia.org/wiki/Part_15_%28FCC_rules%29http://en.wikipedia.org/wiki/ISM_bandhttp://en.wikipedia.org/wiki/Hertzhttp://en.wikipedia.org/wiki/Modulationhttp://en.wikipedia.org/wiki/Half-duplexhttp://en.wikipedia.org/wiki/Wi-Fihttp://en.wikipedia.org/wiki/IEEE_802http://en.wikipedia.org/wiki/Metropolitan_area_networkhttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Institute_of_Electrical_and_Electronics_Engineershttp://en.wikipedia.org/wiki/IEEE_802.11adhttp://en.wikipedia.org/wiki/IEEE_802.11y-2008http://en.wikipedia.org/wiki/Wireless_LAN -
7/28/2019 IEEE 802.11 v2.0
2/15
operate 802.11b/g devices underPart 97 of the FCC Rules and Regulations, allowing increased
power output but not commercial content or encryption.
History
802.11 technology has its origins in a 1985 ruling by the U.S. Federal Communications
Commission that released the ISM band for unlicensed use.
In 1991 NCR Corporation/AT&T (now Alcatel-Lucent and LSI Corporation) invented
the precursor to 802.11 in Nieuwegein, The Netherlands. The inventors initially intended to use
the technology for cashier systems. The first wireless products were brought to the market under
the name WaveLAN with raw data rates of 1 Mbit/s and 2 Mbit/s.
Vic Hayes, who held the chair of IEEE 802.11 for 10 years and has been called the
"father of Wi-Fi" was involved in designing the initial 802.11b and 802.11a standards within theIEEE.
[4]
In 1999, the Wi-Fi Alliance was formed as a trade association to hold the Wi-Fi
trademark under which most products are sold.
Protocols
802.11
protocol
Freq.
(GHz)
Bandwidth
(MHz)
Data rate per
stream
(Mbit/s)
Allowable
MIMO
streams
Modulation Approximate
indoor range
Approximate
outdoor
range]
(m) (ft) (m) (ft)
2.4 20 1, 2 1 DSSS,
FHSS
20 66 100 330
a 5 20 6, 9, 12, 18,
24,36, 48, 54
1 OFDM 35 115 120 390
3.7 5,000 16,000
b 2.4 20 1, 2, 5.5, 11 1 DSSS 35 115 140 460
g 2.4 20 6, 9, 12, 18,
24,36, 48, 54
1 OFDM,
DSSS
38 125 140 460
n 2.4/5 20 7.2,14.4,21.7,
28.9,43.3,57.8,65, 72.2
4 OFDM 70 230 250 820
40 15,30,45,60,90,120,135, 150
70 230 250 820
ac(DRAFT)
2.4/5 20 up to 87.6 840 up to 200
80 up to 433.3
160 up to 866.7
ad 2.4/5/60 up to 7000
http://en.wikipedia.org/wiki/Part_97_%28FCC_rules%29http://en.wikipedia.org/wiki/ISM_bandhttp://en.wikipedia.org/wiki/NCR_Corporationhttp://en.wikipedia.org/wiki/AT%26T_Corporationhttp://en.wikipedia.org/wiki/Alcatel-Lucenthttp://en.wikipedia.org/wiki/LSI_Corporationhttp://en.wikipedia.org/wiki/Nieuwegeinhttp://en.wikipedia.org/wiki/WaveLANhttp://en.wikipedia.org/wiki/Vic_Hayeshttp://en.wikipedia.org/wiki/Institute_of_Electrical_and_Electronics_Engineershttp://en.wikipedia.org/wiki/IEEE_802.11#cite_note-4http://en.wikipedia.org/wiki/IEEE_802.11#cite_note-4http://en.wikipedia.org/wiki/IEEE_802.11#cite_note-4http://en.wikipedia.org/wiki/Wi-Fi_Alliancehttp://en.wikipedia.org/wiki/Wi-Fihttp://en.wikipedia.org/wiki/Data_signaling_ratehttp://en.wikipedia.org/wiki/MIMOhttp://en.wikipedia.org/wiki/IEEE_802.11_%28legacy_mode%29http://en.wikipedia.org/wiki/IEEE_802.11_%28legacy_mode%29http://en.wikipedia.org/wiki/Direct-sequence_spread_spectrumhttp://en.wikipedia.org/wiki/Frequency-hopping_spread_spectrumhttp://en.wikipedia.org/wiki/IEEE_802.11a-1999http://en.wikipedia.org/wiki/Orthogonal_frequency-division_multiplexinghttp://en.wikipedia.org/wiki/Orthogonal_frequency-division_multiplexinghttp://en.wikipedia.org/wiki/IEEE_802.11b-1999http://en.wikipedia.org/wiki/IEEE_802.11b-1999http://en.wikipedia.org/wiki/Direct-sequence_spread_spectrumhttp://en.wikipedia.org/wiki/IEEE_802.11g-2003http://en.wikipedia.org/wiki/IEEE_802.11g-2003http://en.wikipedia.org/wiki/Orthogonal_frequency-division_multiplexinghttp://en.wikipedia.org/wiki/Direct-sequence_spread_spectrumhttp://en.wikipedia.org/wiki/IEEE_802.11n-2009http://en.wikipedia.org/wiki/IEEE_802.11n-2009http://en.wikipedia.org/wiki/Orthogonal_frequency-division_multiplexinghttp://en.wikipedia.org/wiki/Orthogonal_frequency-division_multiplexinghttp://en.wikipedia.org/wiki/IEEE_802.11achttp://en.wikipedia.org/wiki/IEEE_802.11achttp://en.wikipedia.org/wiki/IEEE_802.11achttp://en.wikipedia.org/wiki/IEEE_802.11adhttp://en.wikipedia.org/wiki/IEEE_802.11adhttp://en.wikipedia.org/wiki/IEEE_802.11adhttp://en.wikipedia.org/wiki/IEEE_802.11achttp://en.wikipedia.org/wiki/IEEE_802.11achttp://en.wikipedia.org/wiki/Orthogonal_frequency-division_multiplexinghttp://en.wikipedia.org/wiki/IEEE_802.11n-2009http://en.wikipedia.org/wiki/Direct-sequence_spread_spectrumhttp://en.wikipedia.org/wiki/Orthogonal_frequency-division_multiplexinghttp://en.wikipedia.org/wiki/IEEE_802.11g-2003http://en.wikipedia.org/wiki/Direct-sequence_spread_spectrumhttp://en.wikipedia.org/wiki/IEEE_802.11b-1999http://en.wikipedia.org/wiki/Orthogonal_frequency-division_multiplexinghttp://en.wikipedia.org/wiki/IEEE_802.11a-1999http://en.wikipedia.org/wiki/Frequency-hopping_spread_spectrumhttp://en.wikipedia.org/wiki/Direct-sequence_spread_spectrumhttp://en.wikipedia.org/wiki/IEEE_802.11_%28legacy_mode%29http://en.wikipedia.org/wiki/MIMOhttp://en.wikipedia.org/wiki/Data_signaling_ratehttp://en.wikipedia.org/wiki/Wi-Fihttp://en.wikipedia.org/wiki/Wi-Fi_Alliancehttp://en.wikipedia.org/wiki/IEEE_802.11#cite_note-4http://en.wikipedia.org/wiki/Institute_of_Electrical_and_Electronics_Engineershttp://en.wikipedia.org/wiki/Vic_Hayeshttp://en.wikipedia.org/wiki/WaveLANhttp://en.wikipedia.org/wiki/Nieuwegeinhttp://en.wikipedia.org/wiki/LSI_Corporationhttp://en.wikipedia.org/wiki/Alcatel-Lucenthttp://en.wikipedia.org/wiki/AT%26T_Corporationhttp://en.wikipedia.org/wiki/NCR_Corporationhttp://en.wikipedia.org/wiki/ISM_bandhttp://en.wikipedia.org/wiki/Part_97_%28FCC_rules%29 -
7/28/2019 IEEE 802.11 v2.0
3/15
Frames
Current 802.11 standards define "frame" types for use in transmission of data as well asmanagement and control of wireless links.
Frames are divided into very specific and standardized sections. Each frame consists of an MAC
header, payload and frame check sequence (FCS). Some frames may not have the payload. The
first two bytes of the MAC header form a frame control field specifying the form and function of
the frame. The frame control field is further subdivided into the following sub-fields:
Protocol Version: two bits representing the protocol version. Currently used protocol
version is zero. Other values are reserved for future use.
Type: two bits identifying the type of WLAN frame. Control, Data and Management are
various frame types defined in IEEE 802.11.
Sub Type: Four bits providing addition discrimination between frames. Type and Subtype together to identify the exact frame.
ToDS and FromDS: Each is one bit in size. They indicate whether a data frame isheaded for a distribution system. Control and management frames set these values to
zero. All the data frames will have one of these bits set. However communication within
an IBSS network always set these bits to zero.
More Fragments: The More Fragments bit is set when a packet is divided into multiple
frames for transmission. Every frame except the last frame of a packet will have this bit
set.
Retry: Sometimes frames require retransmission, and for this there is a Retry bit which isset to one when a frame is resent. This aids in the elimination of duplicate frames.
Power Management: This bit indicates the power management state of the sender afterthe completion of a frame exchange. Access points are required to manage the connection
and will never set the power saver bit.
More Data: The More Data bit is used to buffer frames received in a distributed system.
The access point uses this bit to facilitate stations in power saver mode. It indicates that at
least one frame is available and addresses all stations connected.
WEP: The WEP bit is modified after processing a frame. It is toggled to one after a
frame has been decrypted or if no encryption is set it will have already been one.
Order: This bit is only set when the "strict ordering" delivery method is employed.
Frames and fragments are not always sent in order as it causes a transmissionperformance penalty.
http://en.wikipedia.org/wiki/Frame_check_sequencehttp://en.wikipedia.org/wiki/Frame_check_sequence -
7/28/2019 IEEE 802.11 v2.0
4/15
The next two bytes are reserved for the Duration ID field. This field can take one of three forms:
Duration, Contention-Free Period (CFP), and Association ID (AID).
An 802.11 frame can have up to four address fields. Each field can carry a MAC address.
Address 1 is the receiver, Address 2 is the transmitter, Address 3 is used for filtering purposes bythe receiver.
The Sequence Control field is a two-byte section used for identifying message order aswell as eliminating duplicate frames. The first 4 bits are used for the fragmentation
number and the last 12 bits are the sequence number.
An optional two-byte Quality of Service control field which was added with 802.11e.
The Frame Body field is variable in size, from 0 to 2304 bytes plus any overhead from
security encapsulation and contains information from higher layers.
The Frame Check Sequence (FCS) is the last four bytes in the standard 802.11 frame.
Often referred to as the Cyclic Redundancy Check (CRC), it allows for integrity check ofretrieved frames. As frames are about to be sent the FCS is calculated and appended.
When a station receives a frame it can calculate the FCS of the frame and compare it to
the one received. If they match, it is assumed that the frame was not distorted duringtransmission.
Management Frames
Management Frames allow for the maintenance of communication. Some common 802.11
subtypes include:
Authentication frame: 802.11 authentication begins with the WNIC sending an
authentication frame to the access point containing its identity. With an open systemauthentication the WNIC only sends a single authentication frame and the access point
responds with an authentication frame of its own indicating acceptance or rejection. Withshared key authentication, after the WNIC sends its initial authentication request it will
receive an authentication frame from the access point containing challenge text. TheWNIC sends an authentication frame containing the encrypted version of the challenge
text to the access point. The access point ensures the text was encrypted with the correct
key by decrypting it with its own key. The result of this process determines the WNIC's
authentication status.
Association request frame: sent from a station it enables the access point to allocate
resources and synchronize. The frame carries information about the WNIC including
supported data rates and the SSID of the network the station wishes to associate with. Ifthe request is accepted, the access point reserves memory and establishes an association
ID for the WNIC. Association response frame: sent from an access point to a station containing the
acceptance or rejection to an association request. If it is an acceptance, the frame willcontain information such an association ID and supported data rates.
Beacon frame: Sent periodically from an access point to announce its presence and
provide the SSID, and other parameters for WNICs within range.
Deauthentication frame: Sent from a station wishing to terminate connection from
another station.
http://en.wikipedia.org/wiki/MAC_addresshttp://en.wikipedia.org/wiki/802.11ehttp://en.wikipedia.org/wiki/Wireless_network_interface_cardhttp://en.wikipedia.org/wiki/SSIDhttp://en.wikipedia.org/wiki/Beacon_framehttp://en.wikipedia.org/wiki/Beacon_framehttp://en.wikipedia.org/wiki/SSIDhttp://en.wikipedia.org/wiki/SSIDhttp://en.wikipedia.org/wiki/Beacon_framehttp://en.wikipedia.org/wiki/SSIDhttp://en.wikipedia.org/wiki/Wireless_network_interface_cardhttp://en.wikipedia.org/wiki/802.11ehttp://en.wikipedia.org/wiki/MAC_address -
7/28/2019 IEEE 802.11 v2.0
5/15
Disassociation frame: Sent from a station wishing to terminate connection. It's an
elegant way to allow the access point to relinquish memory allocation and remove theWNIC from the association table.
Probe request frame: Sent from a station when it requires information from another
station.
Probe response frame: Sent from an access point containing capability information,
supported data rates, etc., after receiving a probe request frame. Reassociation request frame: A WNIC sends a reassociation request when it drops from
range of the currently associated access point and finds another access point with astronger signal. The new access point coordinates the forwarding of any information that
may still be contained in the buffer of the previous access point.
Reassociation response frame: Sent from an access point containing the acceptance orrejection to a WNIC reassociation request frame. The frame includes information
required for association such as the association ID and supported data rates.
Information Elements
2. In terms ofICT, an Information Element (IE) is a part of management frames in the IEEE802.11 wireless LAN protocol. IEs are a device's way to transfer descriptive information about
itself inside management frames. There are usually several IEs inside each such frame, and each
is built ofTLVs mostly defined outside the basic IEEE 802.11 specification.
The common structure of an IE is as follows:
1 1 3 1-252
------------------------------------------------
|Type |Length| OUI | Data |
------------------------------------------------
Whereas the OUI (organizationally unique identifier) is only used when necessary to the protocolbeing used, and the data field holds the TLVs relevant to that IE.
Control Frames
Control frames facilitate in the exchange of data frames between stations. Some common 802.11control frames include:
Acknowledgement (ACK) frame: After receiving a data frame, the receiving station willsend an ACK frame to the sending station if no errors are found. If the sending station
doesn't receive an ACK frame within a predetermined period of time, the sending station
will resend the frame. Request to Send (RTS) frame: The RTS and CTS frames provide an optional collision
reduction scheme for access points with hidden stations. A station sends a RTS frame to
as the first step in a two-way handshake required before sending data frames.
Clear to Send (CTS) frame: A station responds to an RTS frame with a CTS frame. Itprovides clearance for the requesting station to send a data frame. The CTS provides
collision control management by including a time value for which all other stations are to
hold off transmission while the requesting stations transmits.
http://en.wikipedia.org/wiki/Information_and_communication_technologieshttp://en.wikipedia.org/wiki/Type-length-valuehttp://en.wikipedia.org/wiki/Organizationally_unique_identifierhttp://en.wikipedia.org/wiki/Type-length-valuehttp://en.wikipedia.org/wiki/Type-length-valuehttp://en.wikipedia.org/wiki/Organizationally_unique_identifierhttp://en.wikipedia.org/wiki/Type-length-valuehttp://en.wikipedia.org/wiki/Information_and_communication_technologies -
7/28/2019 IEEE 802.11 v2.0
6/15
Data frames carry packets from web pages, files, etc. within the body, using RFC 1042
encapsulation and EtherType numbers for protocol identification.
Standard and amendments
The data rates supported by the original 802.11standardsare too slow to support mostgeneral business requirements and slowed the adoption of WLANs. So several standards of
802.11 was developed.
IEEE 802.11-1997: The WLAN standard was originally 1 Mbit/s and 2 Mbit/s, 2.4 GHz
RF and infrared (IR) standard (1997), all the others listed below are Amendments to this
standard, except for Recommended Practices 802.11F and 802.11T.
IEEE 802.11a: 54 Mbit/s, 5 GHz standard (1999, shipping products in 2001)(OFDM)
IEEE 802.11b: Enhancements to 802.11 to support 5.5 and 11 Mbit/s (1999) (also known
as 802.11 High Rate)
IEEE 802.11c: Bridge operation procedures; included in the IEEE 802.1D standard(2001)
IEEE 802.11d: International (country-to-country) roaming extensions (2001)
IEEE 802.11e: Enhancements: QoS, including packet bursting (2005)
IEEE 802.11F: Inter-Access Point Protocol (2003) Withdrawn February 2006
IEEE 802.11g: 54 Mbit/s, 2.4 GHz standard (backwards compatible with b) (2003)
IEEE 802.11h: Spectrum Managed 802.11a (5 GHz) for European compatibility (2004)
IEEE 802.11i: Enhanced security (2004)
IEEE 802.11j: Extensions for Japan (2004)
IEEE 802.11-2007: A new release of the standard that includes amendments a, b, d, e, g,
h, i and j. (July 2007)
IEEE 802.11k: Radio resource measurement enhancements (2008)
IEEE 802.11n: Higher throughput improvements using MIMO (multiple input, multiple
output antennas) (September 2009)
IEEE 802.11p: WAVEWireless Access for the Vehicular Environment (such asambulances and passenger cars) (July 2010)
IEEE 802.11r: Fast BSS transition (FT) (2008)
IEEE 802.11s: Mesh Networking, Extended Service Set (ESS) (July 2011)
IEEE 802.11T: Wireless Performance Prediction (WPP)test methods and metricsRecommendation cancelled
IEEE 802.11u: Improvements related to HotSpots and 3rd party authorization of clients,
e.g. cellular network offload (February 2011)
IEEE 802.11v: Wireless network management (February 2011)
IEEE 802.11w: Protected Management Frames (September 2009)
IEEE 802.11y: 36503700 MHz Operation in the U.S. (2008)
IEEE 802.11z: Extensions to Direct Link Setup (DLS) (September 2010)
IEEE 802.11-2012: A new release of the standard that includes amendments k, n, p, r, s,
u, v, w, y and z (March 2012)
IEEE 802.11aa: Robust streaming of Audio Video Transport Streams (June 2012)
IEEE 802.11ad: Very High Throughput 60 GHz (December 2012) - see WiGig
IEEE 802.11ae: Prioritization of Management Frames (March 2012)
http://en.wikipedia.org/w/index.php?title=RFC_1042&action=edit&redlink=1http://en.wikipedia.org/wiki/EtherTypehttp://grouper.ieee.org/groups/802/11/http://grouper.ieee.org/groups/802/11/http://grouper.ieee.org/groups/802/11/http://en.wikipedia.org/wiki/Infraredhttp://en.wikipedia.org/wiki/IEEE_802.11ahttp://en.wikipedia.org/wiki/IEEE_802.11bhttp://en.wikipedia.org/wiki/IEEE_802.11chttp://en.wikipedia.org/wiki/IEEE_802.1Dhttp://en.wikipedia.org/wiki/IEEE_802.11dhttp://en.wikipedia.org/wiki/IEEE_802.11ehttp://en.wikipedia.org/wiki/Quality_of_servicehttp://en.wikipedia.org/wiki/IEEE_802.11Fhttp://en.wikipedia.org/wiki/Inter-Access_Point_Protocolhttp://en.wikipedia.org/wiki/IEEE_802.11ghttp://en.wikipedia.org/wiki/IEEE_802.11hhttp://en.wikipedia.org/wiki/IEEE_802.11ihttp://en.wikipedia.org/wiki/IEEE_802.11jhttp://en.wikipedia.org/wiki/IEEE_802.11khttp://en.wikipedia.org/wiki/IEEE_802.11nhttp://en.wikipedia.org/wiki/IEEE_802.11phttp://en.wikipedia.org/wiki/IEEE_802.11rhttp://en.wikipedia.org/wiki/IEEE_802.11shttp://en.wikipedia.org/wiki/Extended_Service_Sethttp://en.wikipedia.org/wiki/IEEE_802.11uhttp://en.wikipedia.org/wiki/IEEE_802.11vhttp://en.wikipedia.org/wiki/Network_managementhttp://en.wikipedia.org/wiki/IEEE_802.11whttp://en.wikipedia.org/wiki/IEEE_802.11yhttp://en.wikipedia.org/w/index.php?title=IEEE_802.11z&action=edit&redlink=1http://en.wikipedia.org/w/index.php?title=IEEE_802.11aa&action=edit&redlink=1http://en.wikipedia.org/wiki/IEEE_802.11adhttp://en.wikipedia.org/wiki/WiGighttp://en.wikipedia.org/w/index.php?title=IEEE_802.11ae&action=edit&redlink=1http://en.wikipedia.org/w/index.php?title=IEEE_802.11ae&action=edit&redlink=1http://en.wikipedia.org/wiki/WiGighttp://en.wikipedia.org/wiki/IEEE_802.11adhttp://en.wikipedia.org/w/index.php?title=IEEE_802.11aa&action=edit&redlink=1http://en.wikipedia.org/w/index.php?title=IEEE_802.11z&action=edit&redlink=1http://en.wikipedia.org/wiki/IEEE_802.11yhttp://en.wikipedia.org/wiki/IEEE_802.11whttp://en.wikipedia.org/wiki/Network_managementhttp://en.wikipedia.org/wiki/IEEE_802.11vhttp://en.wikipedia.org/wiki/IEEE_802.11uhttp://en.wikipedia.org/wiki/Extended_Service_Sethttp://en.wikipedia.org/wiki/IEEE_802.11shttp://en.wikipedia.org/wiki/IEEE_802.11rhttp://en.wikipedia.org/wiki/IEEE_802.11phttp://en.wikipedia.org/wiki/IEEE_802.11nhttp://en.wikipedia.org/wiki/IEEE_802.11khttp://en.wikipedia.org/wiki/IEEE_802.11jhttp://en.wikipedia.org/wiki/IEEE_802.11ihttp://en.wikipedia.org/wiki/IEEE_802.11hhttp://en.wikipedia.org/wiki/IEEE_802.11ghttp://en.wikipedia.org/wiki/Inter-Access_Point_Protocolhttp://en.wikipedia.org/wiki/IEEE_802.11Fhttp://en.wikipedia.org/wiki/Quality_of_servicehttp://en.wikipedia.org/wiki/IEEE_802.11ehttp://en.wikipedia.org/wiki/IEEE_802.11dhttp://en.wikipedia.org/wiki/IEEE_802.1Dhttp://en.wikipedia.org/wiki/IEEE_802.11chttp://en.wikipedia.org/wiki/IEEE_802.11bhttp://en.wikipedia.org/wiki/IEEE_802.11ahttp://en.wikipedia.org/wiki/Infraredhttp://grouper.ieee.org/groups/802/11/http://en.wikipedia.org/wiki/EtherTypehttp://en.wikipedia.org/w/index.php?title=RFC_1042&action=edit&redlink=1 -
7/28/2019 IEEE 802.11 v2.0
7/15
In process
IEEE 802.11ac: Very High Throughput
-
7/28/2019 IEEE 802.11 v2.0
8/15
(AP). An access point is a station, thus addressable. So, data moves between the BSS and the
DS with the help of these access points.
Creating large and complex networks using BSS's and DS's leads us to the next level of
hierarchy, the Extended Service Set or ESS. The beauty of the ESS is the entire network looks
like an independent basic service set to the Logical Link Control layer (LLC). This means that
stations within the ESS can communicate or even move between BSSs transparently to the LLC.
Infrastructure Mode
One of the requirements of IEEE 802.11 is that it can be used with existing wired
networks. 802.11 solved this challenge with the use of a Portal. A portal is the logical integrationbetween wired LANs and 802.11. It also can serve as the access point to the DS. All data going to
an 802.11 LAN from an 802.X LAN must pass through a portal. It thus functions as bridge
between wired and wireless.
The implementation of the DS is not specified by 802.11. Therefore, a distribution system
may be created from existing or new technologies. A point-to-point bridge connecting LANs in two
separate buildings could become a DS.
While the implementation for the DS is not specified, 802.11 does specify the services, which
the DS must support. Services are divided into two sections
1. Station Services (SS)
2. Distribution System Services (DSS).
There are five services provided by the DSS
1. Association
2. Reassociation
-
7/28/2019 IEEE 802.11 v2.0
9/15
3. Disassociation
4. Distribution
5. Integration
Association supports no-transition mobility but is not enough to support BSS-transition.
Enter Reassociation. This service allows the station to switch its association from one AP to
another. Both association and reassociation are initiated by the station. Disassociation is when theassociation between the station and the AP is terminated. This can be initiated by either party. A
disassociated station cannot send or receive data. ESS-transition are not supported. A station can
move to a new ESS but will have to reinitiate connections.
Distribution and Integration are the remaining DSS's. Distribution is simply getting the data
from the sender to the intended receiver. The message is sent to the local AP (input AP), then
distributed through the DS to the AP (output AP) that the recipient is associated with. If the sender
and receiver are in the same BSS, the input and out AP's are the same. So the distribution service
is logically invoked whether the data is going through the DS or not. Integration is when the output
AP is a portal. Thus, 802.x LANs are integrated into the 802.11 DS.
Station services are:
1. Authentication
2. Deauthentication
3. Privacy
4. MAC Service Data Unit (MSDU) Delivery.
With a wireless system, the medium is not exactly bounded as with a wired system. In order to
control access to the network, stations must first establish their identity. This is much like trying to
enter a radio net in the military.
Before you are acknowledged and allowed to converse, you must first pass a series of tests to
ensure that you are who you say you are. That is really all authentication is. Once a station has
been authenticated, it may then associate itself. The authentication relationship may be between
two stations inside an IBSS or to the AP of the BSS. Authentication outside of the BSS does not
take place.
There are two types of authentication services offered by 802.11. The first is Open System
Authentication. This means that anyone who attempts to authenticate will receive authentication.
The second type is Shared Key Authentication. In order to become authenticated the users must
be in possession of a shared secret. The shared secret is implemented with the use of the Wired
Equivalent Privacy (WEP) privacy algorithm. The shared secret is delivered to all stations aheadof time in some secure method (such as someone walking around and loading the secret onto
each station).
-
7/28/2019 IEEE 802.11 v2.0
10/15
Deauthentication is when either the station or AP wishes to terminate a stations
authentication. When this happens the station is automatically disassociated. Privacy is an
encryption algorithm, which is used so that other 802.11 users cannot eavesdrop on your LAN
traffic. IEEE 802.11 specifies Wired Equivalent Privacy (WEP) as an optional algorithm to satisfy
privacy. If WEP is not used then stations are "in the clear" or "in the red", meaning that their traffic
is not encrypted. Data transmitted in the clear are called plaintext. Data transmissions, which are
encrypted, are called ciphertext. All stations start "in the red" until they are authenticated. MSDUdelivery ensures that the information in the MAC service data unit is delivered between the
medium access control service access points.
The bottom line is this, authentication is basically a network wide password. Privacy iswhether or not encryption is used. Wired Equivalent Privacy is used to protect authorized stations
from eavesdroppers. WEP is reasonably strong. The algorithm can be broken in time. The
relationship between breaking the algorithm is directly related to the length of time that a key is in
use. So, WEP allows for changing of the key to prevent brute force attack of the algorithm. WEP
can be implemented in hardware or in software.
Security
In 2001, a group from the University of California, Berkeleypresented a paper describing
weaknesses in the 802.11 Wired Equivalent Privacy (WEP) security mechanism defined in the
original standard; they were followed by Fluhrer, Mantin, and Shamir's paper titled "Weaknesses
in the Key Scheduling Algorithm of RC4". Not long after, Adam Stubblefield and AT&Tpublicly announced the first verification of the attack. In the attack, they were able to intercept
transmissions and gain unauthorized access to wireless networks.
http://en.wikipedia.org/wiki/University_of_California,_Berkeleyhttp://en.wikipedia.org/wiki/802.11http://en.wikipedia.org/wiki/Wired_Equivalent_Privacyhttp://en.wikipedia.org/wiki/Fluhrer,_Mantin_and_Shamir_attackhttp://en.wikipedia.org/wiki/RC4http://en.wikipedia.org/wiki/AT%26T_Corporationhttp://en.wikipedia.org/wiki/AT%26T_Corporationhttp://en.wikipedia.org/wiki/RC4http://en.wikipedia.org/wiki/Fluhrer,_Mantin_and_Shamir_attackhttp://en.wikipedia.org/wiki/Wired_Equivalent_Privacyhttp://en.wikipedia.org/wiki/802.11http://en.wikipedia.org/wiki/University_of_California,_Berkeley -
7/28/2019 IEEE 802.11 v2.0
11/15
The Security in 802.11 is increased by,
Authentication on1. New nodes issue a Request for authentication.2. Network sends a block of random text.3. The node encrypts it with network password and returns.
One shared secret key per network The same encryption algorithm is used for privacy. WEP Algorithm is based on RC4
PRNT algorithm developed by RSA Data Security, Inc is widely used.
PHYSICAL LAYER:
The purpose of this document is to explain the basic ideas laying in the foundation of the
technologies adopted by IEEE 802.11 standards for wireless communications at the physicallayer. It is designed for audience working with or administrating the devices complying to the
named standards, and willing to know their principles of operation believing that such
knowledge can help to make educated decisions regarding the related equipment, choose andutilize the available hardware more efficiently.
Using Radio Waves For Data Transmission
Designing a wireless high speed data exchange system is not a trivial task to do. Neither is
the development of the standard for wireless local area networks. The major problems at thephysical layer here caused by the nature of the chosen media are:
Bandwidth allocation;
External interference;
Reflection.
802.11 First Standard For Wireless
LANs
The Institute of Electronic and
Electrical Engineers (IEEE) hasreleased IEEE 802.11 in June 1997.
The standard defined physical and
MAC layers of wireless local area
networks (WLANs).
The physical layer of the
original 802.11 standardized three
wireless data exchange techniques:
Infrared (IR);
Frequency hopping spread spectrum (FHSS);
Direct sequence spread spectrum (DSSS).
-
7/28/2019 IEEE 802.11 v2.0
12/15
The 802.11 radio WLANs operate in the 2.4GHz (2.4 to 2.483 GHz) unlicensed Radio
Frequency (RF) band. The maximum isotropic transmission power in this band allowed by FCCin US is 1Wt, but 802.11 devices are usually limited to the 100mWt value.
The physical layer in 802.11 is split into Physical Layer Convergence Protocol (PLCP) andthe Physical Medium Dependent (PMD) sub layers. The PLCP prepares/parses data units
transmitted/received using various 802.11 media access techniques. The PMD performs the datatransmission/reception and modulation/demodulation directly accessing air under the guidance ofthe PLCP. The 802.11 MAC layer to the great extend is affected by the nature of the media. For
example, it implements a relatively complex for the second layer fragmentation of PDUs.
IR Layer:
Baseband Transmission
850 t0 950 nm range IR
1 Mbps 0r 2 Mbps
Diffuse IR
Up to 10m in typical receivers
FHSS Layer:
2.4 GHz ISM Band
1 and 2 Mbps
3 sets of frequency hopping patterns. Each set has 22 hopping sequences. Total 66channels.
Consecutive frequencies in each sequence are at least 6 MHz apart to avoid a narrowbandinterferer
Adjacent or overlapping cells use different patterns
DSSS Layer:
2.4 GHz band
11 chip spreading factor
11 Channels
Only 3 channels without overlap
10 mW to 100 mW transmitted power
1 and 2 Mbps
Terminal Problem in WLAN:
Terminal problem is peculiar to wireless because it is no found in wired modetransmission. There are two major problems in WLAN. They are
1. Hidden Node Problem2. Exposed Node Problem
-
7/28/2019 IEEE 802.11 v2.0
13/15
HIDDEN NODE PROBLEM
Inwireless networking, the hidden node problem orhidden terminal problem occurs
when a node is visible from a wireless access point (AP), but not from other nodes
communicating with said AP. This leads to difficulties inmedia access control.
Hidden nodes in awireless networkrefer to nodes that are out of range of other nodes or
a collection of nodes. Take a physical star topology with an access point with many nodes
surrounding it in a circular fashion: Each node is within communication range of the AP, but the
nodes cannot communicate with each other, as they do not have a physical connection to eachother. In a wireless network, it is likely that the node at the far edge of the access point's range,
which is known as A, can see the access point, but it is unlikely that the same node can see a
node on the opposite end of the access point's range, C. These nodes are known as hidden. The
problem is when nodes A and C start to sendpacketssimultaneously to the access point B. Since
the nodes cannot sense the carrier, Carrier sense multiple access with collision avoidance(CSMA/CA) does not work, and collisions occur, corrupting the data at the access point. To
overcome this problem, handshaking is implemented in conjunction with the CSMA/CA scheme.
The hidden node problem can be observed easily in widespread (>50m radius)WLANsetups with many nodes that usedirectional antennasand have high upload. This is why IEEE
802.11 is suited for bridging the last mile for broadband access only to a very limited extent.
Newer standards such as WiMAX assign time slots to individual stations, thus preventing
multiple nodes from sending simultaneously and ensuring fairness even in over-subscriptionscenarios.
Solution:
IEEE 802.11 uses 802.11 RTS/CTS acknowledgment and handshake packets to partly
overcome the hidden node problem. RTS/CTS is not a complete solution and may decreasethroughput even further, but adaptive acknowledgments from the base station can help too.
http://en.wikipedia.org/wiki/Wireless_networkinghttp://en.wikipedia.org/wiki/Wireless_networkinghttp://en.wikipedia.org/wiki/Wireless_networkinghttp://en.wikipedia.org/wiki/Node_%28networking%29http://en.wikipedia.org/wiki/Node_%28networking%29http://en.wikipedia.org/wiki/Wireless_access_pointhttp://en.wikipedia.org/wiki/Wireless_access_pointhttp://en.wikipedia.org/wiki/Media_Access_Controlhttp://en.wikipedia.org/wiki/Media_Access_Controlhttp://en.wikipedia.org/wiki/Media_Access_Controlhttp://en.wikipedia.org/wiki/Wireless_networkhttp://en.wikipedia.org/wiki/Wireless_networkhttp://en.wikipedia.org/wiki/Wireless_networkhttp://en.wikipedia.org/wiki/Star_networkhttp://en.wikipedia.org/wiki/Star_networkhttp://en.wikipedia.org/wiki/Packet_%28information_technology%29http://en.wikipedia.org/wiki/Packet_%28information_technology%29http://en.wikipedia.org/wiki/Packet_%28information_technology%29http://en.wikipedia.org/wiki/Carrier_sense_multiple_access_with_collision_avoidancehttp://en.wikipedia.org/wiki/Carrier_sense_multiple_access_with_collision_avoidancehttp://en.wikipedia.org/wiki/CSMA_CAhttp://en.wikipedia.org/wiki/CSMA_CAhttp://en.wikipedia.org/wiki/CSMA_CAhttp://en.wikipedia.org/wiki/Wireless_LANhttp://en.wikipedia.org/wiki/Wireless_LANhttp://en.wikipedia.org/wiki/Wireless_LANhttp://en.wikipedia.org/wiki/Directional_antennahttp://en.wikipedia.org/wiki/Directional_antennahttp://en.wikipedia.org/wiki/Directional_antennahttp://en.wikipedia.org/wiki/IEEE_802.11http://en.wikipedia.org/wiki/IEEE_802.11http://en.wikipedia.org/wiki/IEEE_802.11http://en.wikipedia.org/wiki/IEEE_802.11http://en.wikipedia.org/wiki/Last_milehttp://en.wikipedia.org/wiki/Last_milehttp://en.wikipedia.org/wiki/Last_milehttp://en.wikipedia.org/wiki/WiMAXhttp://en.wikipedia.org/wiki/WiMAXhttp://en.wikipedia.org/wiki/IEEE_802.11http://en.wikipedia.org/wiki/IEEE_802.11http://en.wikipedia.org/wiki/802.11_RTS/CTShttp://en.wikipedia.org/wiki/802.11_RTS/CTShttp://en.wikipedia.org/wiki/802.11_RTS/CTShttp://en.wikipedia.org/wiki/IEEE_802.11http://en.wikipedia.org/wiki/WiMAXhttp://en.wikipedia.org/wiki/Last_milehttp://en.wikipedia.org/wiki/IEEE_802.11http://en.wikipedia.org/wiki/IEEE_802.11http://en.wikipedia.org/wiki/Directional_antennahttp://en.wikipedia.org/wiki/Wireless_LANhttp://en.wikipedia.org/wiki/CSMA_CAhttp://en.wikipedia.org/wiki/Carrier_sense_multiple_access_with_collision_avoidancehttp://en.wikipedia.org/wiki/Packet_%28information_technology%29http://en.wikipedia.org/wiki/Star_networkhttp://en.wikipedia.org/wiki/Wireless_networkhttp://en.wikipedia.org/wiki/Media_Access_Controlhttp://en.wikipedia.org/wiki/Wireless_access_pointhttp://en.wikipedia.org/wiki/Node_%28networking%29http://en.wikipedia.org/wiki/Wireless_networking -
7/28/2019 IEEE 802.11 v2.0
14/15
Protocol Description(RTS/CTS)
Anodewishing to send data initiates the process by sending a Request to Send frame
(RTS). The destination node replies with a Clear To Send frame (CTS). Any other node
receiving the RTS or CTS frame should refrain from sending data for a given time (solving thehidden node problem). The amount of time the node should wait before trying to get access to
the medium is included in both the RTS and the CTS frame. This protocol was designed underthe assumption that all nodes have the same transmission ranges.
The other methods that can be employed to solve hidden node problem are :
Increase Transmitting Power From the Nodes
Useomnidirectional antennas
Remove obstacles
Move the node
Use protocol enhancement software
Useantenna diversity
EXPOSED NODE PROBLEM
Inwireless networks, the exposed node problem occurs when a node is prevented from
sending packets to other nodes due to a neighboring transmitter. Consider an example of 4 nodes
labeled R1, S1, S2, and R2, where the two receivers are out of range of each other, yet the twotransmitters in the middle are in range of each other. Here, if a transmission between S1 and R1
is taking place, node S2 is prevented from transmitting to R2 as it concludes aftercarrier sense
that it will interfere with the transmission by its neighbor S1. However note that R2 could still
receive the transmission of S2 without interference because it is out of range of S1.
Solution:
IEEE 802.11 RTS/CTS mechanism helps to solve this problem only if the nodes are
synchronized and packet sizes and data rates are the same for both the transmitting nodes. When
a node hears an RTS from a neighboring node, but not the corresponding CTS, that node can
deduce that it is an exposed node and is permitted to transmit to other neighboring nodes.
http://en.wikipedia.org/wiki/Node_%28networking%29http://en.wikipedia.org/wiki/Node_%28networking%29http://en.wikipedia.org/wiki/Node_%28networking%29http://en.wikipedia.org/wiki/Frame_%28networking%29http://en.wikipedia.org/wiki/Frame_%28networking%29http://en.wikipedia.org/wiki/Hidden_node_problemhttp://en.wikipedia.org/wiki/Hidden_node_problemhttp://en.wikipedia.org/wiki/Omnidirectional_antennahttp://en.wikipedia.org/wiki/Omnidirectional_antennahttp://en.wikipedia.org/wiki/Omnidirectional_antennahttp://en.wikipedia.org/wiki/Antenna_diversityhttp://en.wikipedia.org/wiki/Antenna_diversityhttp://en.wikipedia.org/wiki/Antenna_diversityhttp://en.wikipedia.org/wiki/Wireless_networkshttp://en.wikipedia.org/wiki/Wireless_networkshttp://en.wikipedia.org/wiki/Wireless_networkshttp://en.wikipedia.org/wiki/Carrier_sensehttp://en.wikipedia.org/wiki/Carrier_sensehttp://en.wikipedia.org/wiki/Carrier_sensehttp://en.wikipedia.org/wiki/IEEE_802.11_RTS/CTShttp://en.wikipedia.org/wiki/IEEE_802.11_RTS/CTShttp://en.wikipedia.org/wiki/IEEE_802.11_RTS/CTShttp://en.wikipedia.org/wiki/Carrier_sensehttp://en.wikipedia.org/wiki/Wireless_networkshttp://en.wikipedia.org/wiki/Antenna_diversityhttp://en.wikipedia.org/wiki/Omnidirectional_antennahttp://en.wikipedia.org/wiki/Hidden_node_problemhttp://en.wikipedia.org/wiki/Frame_%28networking%29http://en.wikipedia.org/wiki/Node_%28networking%29 -
7/28/2019 IEEE 802.11 v2.0
15/15
If the nodes are not synchronized (or if the packet sizes are different or the data rates are
different) the problem may occur that the sender will not hear the CTS or the ACK during thetransmission of data of the second sender.
Applications:
Wireless LANs have a great deal of applications. Modern implementations of WLANs
range from small in-home networks to large, campus-sized ones to completely mobile networks
on airplanes and trains. Users can access the Internet from WLAN hotspots in restaurants, hotels,and now with portable devices that connect to 3G or 4G networks. Oftentimes these types of
public access points require no registration or password to join the network. Others can be
accessed once registration has occurred and/or a fee is paid.
Future:
More Bandwidth in future by
1. Better encoding: Multilevel modulation 8Mbps2. Fewer channels with more bandwidth 4 MHz channels3. Find another band. May get 150 MHz band in 5 GHz band.