Learning Objectives Tell how IEEE 802.11a networks function, and how they differ from 802.11b networks List the advantages and disadvantages of an IEEE 802.11g network Describe the HiperLAN/2 networks Compare low-speed and high-speed WLANs Explain basic and enhanced WLAN security features High Speed WLANs Three standards for high-speed WLANs that transmit at speeds over 15 Mbps IEEE 802.11a IEEE 802.11g HiperLAN/2 All WLANs are concerned with security How to prevent unauthorized access IEEE 802.11a Approved in 1999, 802.11a transmits at speeds of 5.5 Mbps and 11 Mbps Great demand for 802.11a WLANS, also called Wi-Fi5, with maximum speed of 54 Mbps Devices use gallium arsenide (GaAs) or silicon germanium (SiGe) rather than CMOS semiconductors Increased speed achieved by higher frequency, more transmission channels, multiplexing techniques, and more efficient error-correction U-NII Frequency Band 802.11b uses unlicensed Industrial, Scientific, and Medical (ISM) band and specifies 14 frequencies 802.11a uses Unlicensed Information Infrastructure (U-NII) band Table 7-1 compares ISM and U-NII U-NII is divided into three bands, shown in Table 7-2 U-NII provides more bandwidth, faster transmission, and increased power Efforts underway to unify 5 GHz bands globally ISM vs. U-NII U-NII Spectrum Channel Allocation 802.11a WLANs have have 11 channels in USA but requires 25 MHz passband See Figure 7.1 Figure 7-2 shows 8 channels in Low and Medium Bands with 20 MHz channel supporting 52 carrier signals, each 200 KHz wide Supports eight networks per AP, as shown in Figure 7-3 IEEE 802.11e Task Group is working on standard that supports quality of service (QOS) 802.11b Channels 802.11a Channels Orthogonal Frequency Division Multiplexing Electromagnetic waves reflect off surfaces and may be delayed in reaching their destination Figure 7-4 illustrates multipath distortion Receiving device waits until all reflections are received before it can transmit Increasing speed of WLAN only causes longer delays waiting for reflections 802.11a uses Orthogonal Frequency Division Multiplexing (OFDM) to solve this problem Orthogonal Frequency Division Multiplexing Dating to 1960s, OFDM’s primary role is to split high-speed digital signal into several slower signals running in parallel Sending device breaks transmission into pieces and sends it over channels in parallel Receiving device combines signals to re-create the transmission See Figure 7-5 Multiple Channels of OFDM OFDM Breaks 802.11B Ceiling Limit Slowing down transmissions actually delays reflections, increases total throughput, and results in faster WLAN See Figure 7-6 802.11a specifies eight overlapping channels, each divided into 52 subchannels that are 300 KHz wide OFDM uses 48 subchannels for data and the remaining four for error correction OFDM vs. Single Channel Modulation Techniques Vary Depending on Speed 6 Mbps—phase shift keying (PSK) Encodes 125 Kbps of data on each of 48 subchannels, resulting in 6Mbps data rate See Figure 7-7 12 Mbps—quadrature phase shift keying (QPSK) Encodes 250Kbps per channel for 12 Mbps data rate See Figure 7-8 PSK QPSK Modulation Techniques Vary Depending on Speed 24 Mbps—16-level quadrature amplitude modulation (16-QAM) 16 different signals can encode 500 Kbps per subchannel See Figure 7-9 54 Mbps—64-level quadrature amplitude modulation (64-QAM) Transmits 1,125 Mbps over each of 48 subchannels See Figure 7-10 16-QAM 64-QAM Higher Speeds Official top speed of 802.11a is 54 Mbps Specification allows for higher speeds known as turbo mode or 2X mode Each vendor can develop 2X mode by combining two frequency channels Produces 96 subchannels and speeds up to 108 Mbps Other 2X mode techniques include increasing and reallocating individual carriers and using different coding rate schemes Error Correction 802.11a transmissions significantly reduce errors Minimizes radio interference from outside sources 801.11a has enhanced error correction Forward Error Correction (FEC) transmits secondary copy of information that may be used if data is lost Uses 48 channels for standard transmissions and 4 for FEC transmissions 802.11a Physical Layer 802.11a changed only physical layer PHY layer is divided into two parts Physical Medium Dependent (PMD) sublayer defines method for transmitting and receiving data over wireless medium Physical Layer Convergence Procedure (PLCP) reformats data received from MAC layer into frame that PMD sublayer can transmit PLCP Based on OFDM, PLCP frame has three parts Preamble—allows receiving device to prepare for rest of frame Header—provides information about frame Data—information to be transmitted See Figure 7-11 802.11a PLCP Frame Fields in PLCP Frame Synchronization Rate Length Parity Tail Service Data Pad 802.11a Rate Field Values Advantages and Disadvantages Advantages Good for area that need higher transmission speeds Disadvantages Shorter range of coverage Approximately 225 feet as compared with 375 feet for 802.11b WLAN IEEE 802.11g In 2001, IEEE proposed 802.11g draft standard to combine stability of 802.11b with faster data transfer rates of 802.11a Operates in 2.4 GHz ISM frequency Has two mandatory modes: Complementary Code Keying (CCK) mode and Orthogonal Frequency Division Multiplexing (OFDM) Offers two optional modes: Packet Binary Convolutional Coding (PBCC-22) and CCK-ODFM 802.11g products not expected until 2003 HiperLAN/2 Similar to 802.11a, HiperLAN/2 was standardized by European Telecommunications Standards Institute Figure 7-12 shows protocol stack for HiperLAN/2 Has three basic layers: Physical, Data Link, and Convergence Products based on HiperLAN/2 may appear in 2003 HiperLAN/2 Protocol Stack Physical Layer PHY layers of IEEE 802.11a and HiperLAN/2 are almost identical Operate in 5 GHz band Use OFDM Transmit up to 54 Mbps Connect seamlessly to wired Ethernet networks Data Link Layer HiperLAN/2 centralizes control of RF medium to access point (AP) AP informs clients, known as mobile terminals (MTs), when they may send data Channel allocation is based on dynamic time-division multiple access (TDMA) that divides bandwidth into several time slots Quality of Service (QOS) refers to dynamically allocated time slots based on needs of MT and condition of network Radio Link Control (RLC) Sublayer Three primary functions of RLC sublayer Connection setup procedure and connection monitoring—authentication and encryption Radio resource handling, channel monitoring, and channel selection—automatic transmission frequency allocation (known as Dynamic Frequency Selection (DFS) Association procedure and reassociation procedure—standardized handoff to nearest AP by roaming MTs Logical Link Control (LLC) sublayer, also part of Data Link Layer, performs error checking Convergence Layer HiperLAN/2 offers seamless high-speed wireless connectivity up to 54 Mbps Can connect to cellular telephone systems Can connect to Asynchronous Transfer Mode (ATMs) systems using fiber-optic media and transmitting at 622 Mbps Can connect to IEEE 1394 (also known as FireWire) high speed external serial bus transmitting at 400 Mbps Summary: High- and Low-Speed WLANs May compare different types of WLANs Do not consider them as competing technologies Rather, they are complementary technologies, each with its strengths and weaknesses and market niche HomeRF—combines wireless data, cordless telephony, and streaming media for home networks Supports QoS and transmits from 1/6 Mbps to 10 Mbps WLAN Summary IEEE 802.11—provides cable-free access for mobile or fixed location at rate of 1 or 2 Mbps 802.11b (Wi-Fi)—popular choice for business wireless networks Transmits at 11 Mbps on three simultaneous channels but offers no QoS and uses crowded ISM band WLAN Summary 802.11a—current leader in business WLANs Uses U-NII frequency, allows 8 simultaneous channels, and transmits at 54 Mbps standard, can be increased to 108 Mbps 802.11g—offers faster data rates while remaining compatible with 802.11b networks Uses only three channels and crowded ISM frequency WLAN Summary HiperLAN/2—uses dynamically allocated time slots and dynamic frequency selection for high-speed communications Popular in Europe Table 7-4 compares WLANs WLAN Comparison 802.11 Security Greatest strength of WLANs is ability to roam freely Greatest weakness is risk of unauthorized user receiving RF signals Some flawed IEEE WLAN security provisions Basic Security involves two areas: Authenticating users Keeping transmissions private Authentication Verifies user has permission to access network Each WLAN client can be given Service Set Identifier (SSID) of network Only clients that know SSID may connect SSID may be entered manually into wireless device, but anyone with device has access to network Access points (APs) may freely advertise SSID to any mobile device within range Privacy IEEE standard provides optional Wired Equivalent Privacy (WEP) specification for data encryption Two types of keys used for encryption Public key cryptography uses matched public and private keys IEEE uses shared key cryptography with same key used for encryption and decryption The longer the key, the more secure it is See Figure 7-13 WEP WEP Privacy Concerns In late 2000, researchers revealed “initialization vector” used to encrypt transmissions with WEP were reused about once every five hours Makes it easy for anyone to collect data to break WEP encryption Researches recovered 128-bit WEP key in less than 2 hours Many think IEEE WLANs should be treated as insecure Enhanced Security Administrators must use enhanced security measures to prevent WLAN attacks Four kinds of WLAN attacks Hardware theft Access point impersonation Passive monitoring Denial of service Additional Security Procedures IEEE task group working on draft known as IEEE 802.1x to allow centralized authentication of wireless clients Uses Extensible Authentication Protocol (EAP)—client negotiates authentication protocols with separate authentication server Uses Remote Authentication Dial-In User Service (RADIUS)—server on wired network sends security keys to wireless client See Figure 7-14 802.1x Security Other Security Steps Use an access control list with MAC addresses of approved clients, as seen in Figure 7-15 Use digital certificates issued by trusted third party for secure, encrypted online communication Use digital wrapper or gatekeeper that secures data by wrapping around another program or file Use a Virtual Private Network (VPN), a secure, encrypted connection between two points Access Control List Higher Levels of Security Reduce transmission power used in WLANs Decreases distance radio waves travel, thus limiting range where hackers can pick up signals Change default WLAN security settings Keep WLAN traffic separate from that of wired network Use 128-bit WEP keys rather than default 40-bit keys