range. 802.11a covers WLAN devices operating in
the 5 GHZ transmission band. Using the 5 GHZ range disallows
interoperability of 802.11b devices as they operate within 2.4
GHZ. 802.11a is capable of supplying data throughput of 54 Mbps
and with proprietary technology known as "rate
doubling" has achieved 108 Mbps. In production networks, a
more standard rating is 20-26 Mbps. 802.11g provides the same
throughout as 802.11a but with backwards compatibility for
802.11b devices using Othogonal Frequency Division Multiplexing
(OFDM) modulation technology. Cisco has developed an access
point that permits 802.11b and 802.11a devices to coexist on
the same WLAN. The access point supplies ‘gateway’ services
allowing these otherwise incompatible devices to communicate.
Web Links Wireless Netowrking Standards and
Organizations http://www.wlana.org/pdf/wlan_standards
_orgs.pdf
Content 3.3 Wireless
Media 3.3.2 Wireless devices and
topologies A wireless network may consist of as few as two
devices. - The nodes could simply be desktop workstations or
notebook computers. Equipped with wireless NICs, an ‘ad hoc’
network could be established which compares to a peer-to-peer
wired network. Both devices act as servers and clients in this
environment. Although it does provide connectivity, security is
at a minimum along with throughput. Another problem with this
type of network is compatibility. Many times NICs from
different manufacturers are not compatible. To solve the
problem of compatibility, an access point (AP) is commonly
installed to act as a central hub for the WLAN
"infrastructure mode". The AP is hard wired to the
cabled LAN to provide Internet access and connectivity to the
wired network. APs are equipped with antennae and provide
wireless connectivity over a specified area referred to as a
cell. Depending on the structural composition of the location
in which the AP is installed and the size and gain of the
antennae, the size of the cell could greatly vary. Most
commonly, the range will be from 91.44 to 152.4 meters (300 to
500 feet). To service larger areas, multiple access points may
be installed with a degree of overlap. The overlap permits
"roaming" between cells. This is very similar to the
services provided by cellular phone companies. Overlap, on
multiple AP networks, is critical to allow for movement of
devices within the WLAN. Although not addressed in the IEEE
standards, a 20-30% overlap is desirable. This rate of overlap
will permit roaming between cells, allowing for the disconnect
and reconnect activity to occur seamlessly without service
interruption. When a client is activated within the WLAN, it
will start "listening" for a compatible device with
which to "associate". This is referred to as
"scanning" and may be active or passive. Active
scanning causes a probe request to be sent from the wireless
node seeking to join the network. The probe request will
contain the Service Set Identifier (SSID) of the network it
wishes to join. When an AP with the same SSID is found, the AP
will issue a probe response. The authentication and association
steps are completed. Passive scanning nodes listen for beacon
management frames (beacons), which are transmitted by the AP
(infrastructure mode) or peer nodes (ad hoc). When a node
receives a beacon that contains the SSID of the network it is
trying to join, an attempt is made to join the network. Passive
scanning is a continuous process and nodes may associate or
disassociate with APs as signal strength changes.
Interactive Media Activity Interactivity: OSI Layer
Devices This animation classifies networking devices by the OSI
layer upon which they operate. Interactive Media
Activity Point and Click: From LAN to WLAN This activity
shows a regular wired LAN. Web Links Sizing Up Your
WLAN http://www.80211-planet.com/tutorials/ article.php/992011
Content 3.3 Wireless Media
3.3.3 How wireless LANs communicate After
establishing connectivity to the WLAN, a node will pass frames
in the same manner as on any other 802.x network. WLANs do not
use a standard 802.3 frame. Therefore, using the term wireless
Ethernet is misleading. There are three types of frames:
control, management, and data. Only the data frame type is
similar to 802.3 frames. The payload of wireless and 802.3
frames is 1500 bytes; however, an Ether frame may not exceed
1518 bytes whereas a wireless frame could be as large as 2346
bytes. Usually the WLAN frame size will be limited to 1518
bytes as it is most commonly connected to a wired Ethernet
network. Since radio frequency (RF) is a shared medium,
collisions can occur just as they do on wired shared medium.
The major difference is that there is no method by which the
source node is able to detect that a collision occurred. For
that reason WLANs use Carrier Sense Multiple Access/Collision
Avoidance (CSMA/CA). This is somewhat like Ethernet CSMA/CD.
When a source node sends a frame, the receiving node returns a
positive acknowledgment (ACK). This can cause consumption of
50% of the available bandwidth. This overhead when combined
with the collision avoidance protocol overhead reduces the
actual data throughput to a maximum of 5.0 to 5.5 Mbps on an
802.11b wireless LAN rated at 11 Mbps. Performance of the
network will also be affected by signal strength and
degradation in signal quality due to distance or interference.
As the signal becomes weaker, Adaptive Rate Selection (ARS)
may be invoked. The transmitting unit will drop the data rate
from 11 Mbps to 5.5 Mbps, from 5.5 Mbps to 2 Mbps or 2 Mbps to
1 Mbps. Web Links 802.11 Medium Access Methods
http://www.80211-planet.com/tutorials/ article.php/ 1548381
Content 3.3 Wireless Media
3.3.4 Authentication and association WLAN
authentication occurs at Layer 2. It is the process of
authenticating the device not the user. This is a critical
point to remember when considering WLAN security,
troubleshooting and overall management. Authentication may be a
null process, as in the case of a new AP and NIC with default
configurations in place. The client will send an authentication
request frame to the AP and the frame will be accepted or
rejected by the AP. The client is notified of the response via
an authentication response frame. The AP may also be configured
to hand off the authentication task to an authentication
server, which would perform a more thorough credentialing
process. Association, performed after authentication, is the
state that permits a client to use the services of the AP to
transfer data. Authentication and Association types
- Unauthenticated and unassociated
- The node is disconnected from the network and not
associated to an access point.
- Authenticated and unassociated
- The
node has been authenticated on the network but has not yet
associated with the access point.
- Authenticated and associated
- The node
is connected to the network and able to transmit and receive
data through the access point.
Methods of
authentication
IEEE 802.11 lists two types of
authentication processes. The first authentication process is
the open system. This is an open connectivity standard in which
only the SSID must match. This may be used in a secure or
non-secure environment although the ability of low level
network ‘sniffers’ to discover the SSID of the WLAN is high.
The second process is the shared key. This process requires the
use of Wireless Equivalency Protocol (WEP) encryption. WEP is a
fairly simple algorithm using 64 and 128 bit keys. The AP is
configured with an encrypted key and nodes attempting to access
the network through the AP must have a matching key. Statically
assigned WEP keys provide a higher level of security than the
open system but are definitely not hack proof. The problem of
unauthorized entry into WLANs is being addressed by a number of