CWNA Chapter5
CWNA Chapter5
CWNA Chapter5
Pg 155
Two sets of definitions
The original alphabet soup
The 802.11-2007 and clauses
Need to know the technologies, clauses, and
letters
802.11 original in 1997
Also known as 802.11 Prime
Pg 155
802.11-2007 rolled up ratified
amendments
IEEE Std 802.11-1999 (R2003)
IEEE Std 802.11a-1999
IEEE Std 802.11b-1999
IEEE Std 802.11d-2001
IEEE Std 802.11g-2003
IEEE Std 802.11h-2003
IEEE Std 802.11i-2004
IEEE Std 802.11j-2004
IEEE Std 802.11e-2005
Pg 155
Original Physical layer options
Infrared (IR)
Infrared (IR) technology uses a light-based medium. Although
an infrared medium was indeed defined in the original
802.11 standard, the implementation is obsolete. More
information about modern implementations of infrared
technology can be found at the Infrared Data Association’s
website, at www. irda. org. The scope of this book focuses
on the 802.11 RF mediums. Infrared devices are known as
clause 16 devices.
Frequency hopping spread spectrum (FHSS)
Radio frequency signals can be defined as narrowband
signals or as spread spectrum signals. An RF signal is
considered spread spectrum when the bandwidth is wider
than what is required to carry the data. Clause 14
Direct sequence spread spectrum (DSSS)
Direct sequence spread spectrum (DSSS) is another spread
spectrum technology that is frequently used and easiest to
implement. DSSS 802.11 radio cards are often known as
clause 15 devices.
Pg 155
FHSS and DSS were originally specified for 2.4
Ghz ISM band
2.4 Ghz to 2.4835 Ghz
Older equipment is much less common now
DSS cannot work with FHSS
Most early implementations were FHSS
Original speeds were 1 Mbps or 2 Mbps
This is bandwidth, not throughput
Used Barker Keying
Pg 156
802.11 b
802.11 a
802.11 g
802.11d
802.11 F
802.11 h
802.11 I
802.11 j
802.11 e
802.11 k
802.11 r
Pg 157
HR-DSSS
Backward
compatible with any DSSS
implementations of 802.11 prime
Not common
Clause 18
2.4 Ghz
CCK modulation
1, 2, 5.5, 11 Mbps
5.5 and 11 are HR-DSSS
Pg 157
For the new 5 Ghz UNII band
Less crowded than 2.4 Ghz
Clause 17
Orthogonal Frequency Division Multiplexing
(OFDM)
Required rates
6, 12, 24
Also supports
6, 9, 12, 18, 24, 36, 48, 54
Different vendors can choose different implementations
Not compatible with earlier standards
But can coexist because no overlap
Pg 159
Clause 19
2.4 Ghz
Extended Rate Physical-ERP
Enhance the 802.11b speeds
Two PHY
ERP-OFDM
ERP-DSSS/CCK
Backward compatible with 802.11b OFDM
Pg 160
Required Speeds
6,12, 24
For backward compatibility, ERP-DSSS/CCK
supports 1, 2, 5.5, 11
Optional
6, 9, 12, 18, 24, 36, 48, 54
Also had ERP-PBCC and DSS-OFDM
Not used much
Pg 160
Due to backward compatibility, multiple
implementations
B-only mode
G-Only Mode
b/g mode
Supports
both, but when a 802.11b signal is
detected, all stations are forced to protection
Causes degradation of throughput to support older
rates
Pg 160
Pg 162
802.11 d
To support other countries
Beacon and probes to support country specific
power levels
802.11 F
Recommended practice
Roaming standard
Like cell phones
IAPP is now a recommendation
Intervendor roaming isn’t great
Pg 163
Recommended practice
Never specified how to implement in 802.11
802.11F never ratified
If vendors support IAPP, you should be able
to roam between vendors
Pg 164
The dynamic frequency selection (DFS) service
provides for the following:
An AP will allow client stations to associate based on the
supported channel of the access point. The term
associate means that a station has become a member of
the AP’s wireless network.
An AP can quiet a channel to test for the presence of
radar.
An AP may test a channel for the presence of radar
before using the channel.
An AP can detect radar on the current channel and other
channels.
An AP can cease operations after radar detection to
avoid interference.
When interference is detected, the AP may choose a
different channel to transmit on and inform all the
associated stations.
Pg 166
TPC provides
Designation of the maximum transmit power
levels permitted on a channel, as permitted by
regulations.
An AP can specify the transmit power of any or
all stations that are associated with the access
point.
An AP can change transmission power on stations
based on factors of the physical RF environment
such as path loss.
Pg 167
Data privacy
Authentication
Replaced WEP
WEP was a poorly implemented solution
Pg 167
Open System Authentication
Verified identity regardless
No authentication
Shared Key Authentication
If you had the key, you were authenticated
Pg 168
Defined the Robust Security Network (RSN)
Better hide data broadcast on an unbounded
medium
Bigger guard at the door to the network
Data Privacy
Authentication
Pg 168
Counter Mode with Cipher Block Chaining
Message Authentication Code Protocol
(CCMP)
AdvancedEncryption Standard (AES) algorithm
AES/CCMP or CCMP
Also supports Temporal Key Integrity
Protocol with RC-4 stream cipher
More like WEP, but much better
Pg 168
802.1X
Implements Extensible Authentication Protocol
(EAP)
Method of authentication not specified
Commonly used with existing authentication
systems
RADIUS
KERBEROS
Pre-Shared Key
Uses a passphrase/Key as the starting point
Pg 168
Defines the methods for establishing
authentication, negitiating security and
generating keys
WiFi Alliance-WPA2 matches the 802.11i
Pg 168
Japanese Market approval
Different frequencies and bands
Pg 168
Layer 2 MAC methods for providing QOS for
time sensitive applications
Voice Over technologies
802.11 prime had some methods for
controlling network
Distributed Coordination Function (DCF)
Random
Point Coordination Function
Access point takes control and polls clients
Pg 169
802.11e defines Hybrid Coordination
Function (HCF)
Enhanced Distributed Channel Access (EDCA)
Extends DCF-allows for prioritization of frames
Create an EZ-PASS lane for higher need traffic
Hybrid
Coordination Function Controlled
Channel Access (HCCA) extends PCF
Allows AP to allow certain stations to transmit first
Matches to the WiFi Alliance Wi-Fi
Multimedia (WMM)
Pg 169
Radio Resource Measurements
Ability to gather information about the network for better
control
Layer 1 and Layer 2
Data gathered by stations and processed by AP or
WLAN controller
Transmit power control (TPC)
The 802.11h amendment defined the use of TPC for the 5
GHz band to reduce interference. Under 802.11k, TPC will
also be used in other frequency bands and in areas governed
by other regulatory agencies.
Client statistics
Physical layer information such as signal-to-noise ratio, signal
strength, and data rates can all be reported back to the
access point or WLAN controller. MAC information such as
frame transmissions, retries, and errors may all be reported
back to the access point or WLAN controller as well.
Pg 170
Channel statistics
Clients may gather noise-floor information based on any
RF energy in the background of the channel and report
this information back to the access point. Channel load
information may also be collected and sent to the AP.
The access point or WLAN controller may use this
information for channel management decisions.
Neighbor reports
Mobile Assisted Handover (MAHO) is a technique used by
digital phones and cellular systems working together to
provide better handover between cells. 802.11k gives
access points or WLAN controllers the ability to direct
stations to perform the sort of tasks that a cellular
network requires its handhelds to do when using MAHO.
Clients will keep table of access points and make
decisions on when to roam
Pg 170
Fast basic service set transition
Fast secure roaming
Proposed for VoIP and other real time
applications
Needed because security takes extra time
Since Authentication takes time, 802.11 r
manages authentication before doing the
switch between access points to limit
delay.
Not part of the 802.11 2007
Pg 171
Test is focused on 802.11n, which is now a
standard
Pg 171
2.4 Ghz AND 5 Ghz
High Throughput-HT
Both PHY and MAC enhanced for 100 Mbps
MIMO technology with OFDM
Increased throughput and greater range
Pg 172
802.11 m
housekeeping
802.11 n
New HT standard
802.11 p
Wireless Access in Vehicles
802.11 s
Wireless Distribution System-Mesh Networks
802.11 T
metrics
Pg 172
802.11 u
Internetworking to other standards
802.11 v
Wireless centralized control
802.11 w
Secure management frames
802.11 y
New frequencies
802.11 z
Direct Link Setup
802.11 aa
Robust audio and video streaming
Pg 175
Know the defined spread spectrum technologies of the original
802.11 standard and the subsequent 802.11-2007 standard.
Although the original 802.11 standard defend infrared, FHSS, and DSSS,
later amendments that are now incorporated in the 802.11-2007
standard also define HR-DSSS, OFDM, and ERP.
Remember both the required data rates and supported data
rates of each PHY.
DSSS and FHSS require and support data rates of 1 and 2 Mbps. Other
PHYs offer a wider support for data rates. For example, OFDM and ERP-
OFDM support data rates of 6, 9, 12, 18, 24, 36, 48, and 54 Mbps, but
only the rates of 6, 12 and 24 Mbps are mandatory. Please understand
that data rates are speeds and not aggregate throughput.
Know the frequency bands used by each PHY as defined by the
802.11-2007 standard.
OFDM equipment operates in the 5 GHz UNII bands. DSSS, FHSS, HR-DSSS,
and ERP devices transmit and receive in the 2.4 GHz ISM band.
Explain the three vendor operational modes of ERP (802.11g)
and the consequences of each mode.
An 802.11g access point may be configured as B-only mode, G-only
mode, or B/G mixed mode. The three modes support different spread
spectrum technologies and have different aggregate throughput results.
Know the mandatory and optional technologies used in
an ERP WLAN.
ERP (802.11g) defines two mandatory PHYs, ERP-OFDM and
ERP-DSSS/CCK. The two optional PHYs are ERP-PBCC and DSSS-
OFDM.
Define transmit power control and dynamic frequency
selection.
TPC and DFS are often mandated for use in the 5 GHz band.
Both technologies are used as a means to avoid interference
with radar transmissions.
Explain the defined wireless security standards both
pre-802.11i and post-802.11i.
Before the passage of 802.11i, WEP encryption and either Open
System or Shared Key authentication were defend. The 802.11i
amendment calls for the use of CCMP/AES for encryption. For
authentication, 802.11i defines either an 802.1X/EAP solution
or the use of preshared keys.
Define the Inter-Access Point Protocol and why it
was originally proposed.
IAPP is a “vendor interoperability” roaming protocol that
is outlined in the 802.11F recommended practice.
Explain the purpose of the 802.11e amendment
and the medium access methods it requires.
The 802.11e amendment addresses quality of service
(QoS) issues by mandating the use of Enhanced
Distributed Channel Access (EDCA) and Hybrid
Coordination Function (HCF).
Understand the purpose of each 802.11 draft
proposal.
Each draft has a specific intended goal. The 802.11s
draft, for example, outlines mesh networking. 802.11n
proposes throughput enhancements using MIMO
technology.