Pietrosemoli, ICTP Feb. 20031 Wireless LAN Overview Abdus Salam ICTP, February 2003 Presented by...

Preview:

Citation preview

Pietrosemoli, ICTP Feb. 2003 1

Wireless LAN Overview

Abdus Salam ICTP, February 2003

Presented by

Ermanno Pietrosemoli

Latin American Networking School - ULA

Pietrosemoli, ICTP Feb. 2003 2

Wireless LAN Overview

• Wireless networks where borne as LANs, but for developing countries applications they are more useful as MANs or even WANs

• The enormous success of this technology has led to a dramatic price reduction of the equipment, from $750 in 1992 to $60 in 2002

Pietrosemoli, ICTP Feb. 2003 3

Wireless LAN OverviewAgenda

• DSSS Channel Allocation

• Access Point Modes and Types

• Clients Types

• 802.11 Standards

• 802.11 Terminology

Pietrosemoli, ICTP Feb. 2003 4

Wireless LAN Overview

• DSSS popularity has eclipsed FHSS, although the latter may be more resistant to interference

• We will focus on DSSS

Pietrosemoli, ICTP Feb. 2003 5

Channel Overlapping

Pietrosemoli, ICTP Feb. 2003 6

Pietrosemoli, ICTP Feb. 2003 7

Pietrosemoli, ICTP Feb. 2003 8

Pietrosemoli, ICTP Feb. 2003 9

Pietrosemoli, ICTP Feb. 2003 10

Access Point Modes

• Root Mode

• Repeater Mode

• Bridge Mode

Pietrosemoli, ICTP Feb. 2003 11

Pietrosemoli, ICTP Feb. 2003 12

Pietrosemoli, ICTP Feb. 2003 13

Pietrosemoli, ICTP Feb. 2003 14

Pietrosemoli, ICTP Feb. 2003 15

Pietrosemoli, ICTP Feb. 2003 16

Pietrosemoli, ICTP Feb. 2003 17

Pietrosemoli, ICTP Feb. 2003 18

• Repeater and Bridging Functions

Pietrosemoli, ICTP Feb. 2003 19

Pietrosemoli, ICTP Feb. 2003 20

Pietrosemoli, ICTP Feb. 2003 21

Pietrosemoli, ICTP Feb. 2003 22

Pietrosemoli, ICTP Feb. 2003 23

Pietrosemoli, ICTP Feb. 2003 24

Pietrosemoli, ICTP Feb. 2003 25

Pietrosemoli, ICTP Feb. 2003 26

Pietrosemoli, ICTP Feb. 2003 27

Pietrosemoli, ICTP Feb. 2003 28

Pietrosemoli, ICTP Feb. 2003 29

Pietrosemoli, ICTP Feb. 2003 30

Chipset Manufacturers

Pietrosemoli, ICTP Feb. 2003 31

Client Devices

Pietrosemoli, ICTP Feb. 2003 32

Client Devices

Pietrosemoli, ICTP Feb. 2003 33

Client Devices

Pietrosemoli, ICTP Feb. 2003 34

Pietrosemoli, ICTP Feb. 2003 35

Pietrosemoli, ICTP Feb. 2003 36

Pietrosemoli, ICTP Feb. 2003 37

Pietrosemoli, ICTP Feb. 2003 38

Common options that most wirelessresidential gateways include are:

• Point-to-Point Protocol over Ethernet (PPPoE)• Network Address Translation (NAT)• Port Address Translation (PAT)• Ethernet switching• Virtual Servers• Print Serving• Fail-over routing• Virtual Private Networks (VPNs)• Dynamic Host Configuration Protocol (DHCP) Server

and Client• Configurable Firewall

Pietrosemoli, ICTP Feb. 2003 39

Pietrosemoli, ICTP Feb. 2003 40

Enterprise Gateway Features

Enterprise wireless gateways do have features, such as Role-Based Access Control (RBAC), that are not found in any access points. RBAC allows an administrator to assign a certain level of wireless network access to a particular job position in the company. If the person doing that job is replaced, the new person automatically gains the same network rights as the replaced person. Having the ability to limit a wireless user's access to corporate resources, as part of the "role", can be a useful security feature.

Pietrosemoli, ICTP Feb. 2003 41

Enterprise Gateway Features

Class of service is typically supported, and an administrator can assign levels of service to a particular user or role. For example, a guest account might be able to use only 500 kbps on the wireless network whereas an administrator might be allowed 2 Mbps connectivity.

Pietrosemoli, ICTP Feb. 2003 42

Configuration and Managementof EG

Enterprise wireless gateways are installed in the main the data path on the wired LAN segment just past the access point(s)

They are configured through console ports using telnet, internal HTTP or HTTPS servers, etc.

Centralized management of only a few devices is one big advantage of using enterprise wireless gateways. An administrator, from a single console, can easily manage a large wireless deployment using only a few central devices instead of a very large number of access points.

Pietrosemoli, ICTP Feb. 2003 43

Configuration and Managementof EWG

Enterprise wireless gateways are normally upgraded through use of TFTP in the same

fashion as many switches and routers on the market today. Configuration backups can often be automated so that the administrator won't have to spend additional management time backing up or recovering from lost configuration files. Enterprise wireless gateways are mostly manufactured as rack-mountable 1U or 2U devices that can fit into your existing data center design.

Pietrosemoli, ICTP Feb. 2003 44

Pietrosemoli, ICTP Feb. 2003 45

UNII Bands

Pietrosemoli, ICTP Feb. 2003 46

UNII Middle Band

The middle UNII band is bound by 5.25 GHz and 5.35 GHz and is specified at 250 mW of output power by the FCC. The power output specified by IEEE for the middle UNII band is 200 mW. This power limit allows operation of devices either indoors or outdoors and is commonly used for short outdoor hops between closely spaced buildings. In the case of a home installation, such a configuration might include an RF link between the house and the garage, or the house and a neighbor’s house.

.

Pietrosemoli, ICTP Feb. 2003 47

UNII Upper Band

The upper UNII band is reserved for outdoor links and is limited by the FCC to 1 Watt of output power. This band occupies the range of frequencies between 5.725 GHz and 5.825 GHz, and is often confused with the 5.8 GHz ISM band. The IEEE specifies the maximum output power for this band as 800 mW, which is plenty of power for almost any outdoor implementation, except for large campuses or long-distance RF links.

Pietrosemoli, ICTP Feb. 2003 48

Power Limits PtMP links have a central point of connection and two

or more non-central connection points. PtMP links are typically configured in a star topology. The central connection point may or may not have an omnidirectional antenna It is important to note that when an omnidirectional antenna is used, the FCC automatically considers the link a PtMP link.

Regarding the setup of a PtMP link, the FCC limits the EIRP to 4 Watts in both the 2.4 GHz ISM band and upper 5 GHz UNII band. The power limit set for the intentional radiator (the device transmitting the RF signal) in each of these bands is 1 Watt. If the transmitting wireless LAN devices are adjustable with respect to their output power, then the system can be customized to the needs of the user.

Pietrosemoli, ICTP Feb. 2003 49

Power Limits Suppose a radio transmitting at 1 Watt (+30 dBm) is

connected directly to a 12 dBi omnidirectional antenna. The total output power at the antenna is about 16 Watts, which is well above the 4 Watt limit. The FCC stipulates that for each 3 dBi above the antenna's initial 6 dBi of gain, the power at the intentional radiator must be reduced by 3 dB below the initial +30 dBm. For our example, since the antenna gain is 12 dBi, the power at the intentional radiator must be reduced by 6 dB. This reduction will result in an intentional radiator power of +24 dBm (30 dBm – 6 dB), or 250 mW and an EIRP of 36 dBm (24 dBm + 12 dBi), or 4 Watts. Clearly this rule can become confusing, but the end result must be that the power at the intentional radiator must never be more than 1 Watt and the EIRP must never be above 4 Watts for a PtMP connection.

Pietrosemoli, ICTP Feb. 2003 50

Power Limits

Pietrosemoli, ICTP Feb. 2003 51

Power Limits

Pietrosemoli, ICTP Feb. 2003 52

Power Limits

Pietrosemoli, ICTP Feb. 2003 53

Power Limits

Pietrosemoli, ICTP Feb. 2003 54

Pietrosemoli, ICTP Feb. 2003 55

Pietrosemoli, ICTP Feb. 2003 56

Pietrosemoli, ICTP Feb. 2003 57

IEEE 802.11g

802.11g provides the same maximum speed of 802.11a,coupled with backwards compatibility for 802.11b devices. This backwards compatibility will make upgrading wireless LANs simple and inexpensive.

IEEE 802.11g specifies operation in the 2.4 GHz ISM band. To achieve the higher data rates found in 802.11a, 802.11g compliant devices utilize Orthogonal Frequency Division Multiplexing (OFDM) modulation technology. These devices can automatically switch to QPSK modulation in order to communicate with the slower 802.11b- and 802.11- compatible devices. With all of the apparent advantages, 802.11g’s use of the crowded 2.4 GHz band could prove to be a disadvantage.

Pietrosemoli, ICTP Feb. 2003 58

Wireless Ethernet Compatibility Alliance

The Wireless Ethernet Compatibility Alliance (WECA) promotes and tests for wireless LAN interoperability of 802.11b devices and 802.11a devices. WECA’s mission is to certify interoperability of Wi-Fi™ (IEEE 802.11) products and to promote Wi-Fi as the global wireless LAN standard across all market segments. As an administrator, you must resolve conflicts among wireless LAN devices that result from interference, incompatibility, or other problems.

Pietrosemoli, ICTP Feb. 2003 59

Wireless Ethernet Compatibility Alliance

Pietrosemoli, ICTP Feb. 2003 60

European Telecommunications Standards Institute

Pietrosemoli, ICTP Feb. 2003 61

European Telecommunications Standards Institute

The website for ETSI is www.etsi.org

Pietrosemoli, ICTP Feb. 2003 62

Wireless LAN Association

The Wireless LAN Association's mission is to educate and raise consumer awareness regarding the use and availability of wireless LANs and to promote the wireless LAN industry in general. The Wireless LAN Association (WLANA) is an educational resource for those seeking to learn more about wireless LANs. WLANA can also help if you are looking for a specific wireless LAN product or service.

WLANA has many partners within the industry that contribute content to the WLANA directory of information. It is this directory, along with the many white papers and case studies that WLANA provides, that offer you valuable information for making your own decisions about wireless LAN implementation.

The website for WLANA is www.wlana.org

Pietrosemoli, ICTP Feb. 2003 63

Pietrosemoli, ICTP Feb. 2003 64

Pietrosemoli, ICTP Feb. 2003 65

Bluetooth

Pietrosemoli, ICTP Feb. 2003 66

Bluetooth

Pietrosemoli, ICTP Feb. 2003 67

Bluetooth

Pietrosemoli, ICTP Feb. 2003 68

Bluetooth

Pietrosemoli, ICTP Feb. 2003 69

The website for IrDA is www.irda.org

Pietrosemoli, ICTP Feb. 2003 70

Locating a Wireless LAN

Pietrosemoli, ICTP Feb. 2003 71

Service Set Identifier

Pietrosemoli, ICTP Feb. 2003 72

Beacons

Beacons (short for beacon management frame) are short frames that are sent from the access point to stations (infrastructure mode) or station-to-station (ad hoc mode) in order to organize and synchronize wireless communication on the wireless LAN.

Beacons serve several functions, including the following:

Pietrosemoli, ICTP Feb. 2003 73

Time SynchronizationBeacons synchronize clients by way of a time-stamp at the exact moment of transmission.When the client receives the beacon, it changes its own clock to reflect the clock of theaccess point. Once this change is made, the two clocks are synchronized. Synchronizingthe clocks of communicating units will ensure that all time-sensitive functions, such ashopping in FHSS systems, are performed without error. The beacon also contains thebeacon interval, which informs stations how often to expect the beacon.

Pietrosemoli, ICTP Feb. 2003 74

FH or DS Parameter SetsBeacons contain information specifically geared to the spread spectrum technology thesystem is using. For example, in a FHSS system, hop and dwell time parameters and hopsequence are included in the beacon. In a DSSS system, the beacon contains channelinformation.

Pietrosemoli, ICTP Feb. 2003 75

SSID InformationStations look in beacons for the SSID of the network they wish to join. When this information is found, the station looks at the MAC address of where the beacon originated and sends an authentication request in hopes of associating with that access point. If a station is set to accept any SSID, then the station will attempt to join thenetwork through the first access point that sends a beacon or the one with the strongest signal strength if there are multiple access points.

Pietrosemoli, ICTP Feb. 2003 76

Traffic Indication Map (TIM)The TIM is used an as indicator of which sleeping stations have packets queued at the access point. This information is passed in each beacon to all associated stations. Whilesleeping, synchronized stations power up their receivers, listen for the beacon, check the TIM to see if they are listed, then, if they are not listed, they power down their receivers and continue sleeping..

Pietrosemoli, ICTP Feb. 2003 77

Supported RatesWith wireless networks, there are many supported speeds depending on the standard ofthe hardware in use. For example, an 802.11b compliant device supports 11, 5.5, 2, & 1Mbps speeds. This capability information is passed in the beacons to inform the stationswhat speeds are supported on the access point.

Pietrosemoli, ICTP Feb. 2003 78

Passive ScanningPassive scanning is the process of listening for beacons on each channel for a specific period of time after the station is initialized. These beacons are sent by access points (infrastructure mode) or client stations (ad hoc mode), and the scanning station catalogs characteristics about the access points or stations based on these beacons. The station searching for a network listens for beacons until it hears a beacon listing the SSID of the network it wishes to join.The station then attempts to join the network through the access point that sent the beacon.

Pietrosemoli, ICTP Feb. 2003 79

Active ScanningActive scanning involves the sending of a probe request frame from a wireless station.Stations send this probe frame when they are actively seeking a network to join. The probe frame will contain either the SSID of the network they wish to join or a broadcast SSID. If a probe request is sent specifying an SSID, then only access points that are servicing that SSID will respond with a probe response frame. If a probe request frame is sent with a broadcast SSID, then all access points within reach will respond with a probe response frame. The point of probing in this manner is to locate access points through which the station can attach to the network. Once an access point with the proper SSID is found, the station initiates the authentication and association steps of joining the network through that access point..

Pietrosemoli, ICTP Feb. 2003 80

Pietrosemoli, ICTP Feb. 2003 81

Active Scanning

Pietrosemoli, ICTP Feb. 2003 82

Pietrosemoli, ICTP Feb. 2003 83

Pietrosemoli, ICTP Feb. 2003 84

Pietrosemoli, ICTP Feb. 2003 85

Pietrosemoli, ICTP Feb. 2003 86

Pietrosemoli, ICTP Feb. 2003 87

Pietrosemoli, ICTP Feb. 2003 88

Pietrosemoli, ICTP Feb. 2003 89

Pietrosemoli, ICTP Feb. 2003 90

Pietrosemoli, ICTP Feb. 2003 91

Recommended