Teaching

advertisement
CWNA Guide to Wireless LANs, Second Edition
5-1
Chapter 5
IEEE 802.11 Media Access Control and Network Layer
Standards
At a Glance
Instructor’s Manual Table of Contents

Overview

Objectives

Teaching Tips

Quick Quizzes

Class Discussion Topics

Additional Projects

Additional Resources

Key Terms
CWNA Guide to Wireless LANs, Second Edition
5-2
Lecture Notes
Overview
The IEEE 802.11 standard specifies that all WLAN features are implemented in the
PHY and MAC layers. Because no modifications are needed at any of the other layers,
existing software designed to meet other 802.x standards will correctly operate on the
802.11 standard. Any network operating system or LAN application that functions on a
standard LAN will also run on a WLAN without modification. In fact, WLANs support
almost all Layer 3-7 protocols, such as TCP/IP, Novell IPX/SPX, Microsoft NetBEUI,
and AppleTalk.
Isolating all of the WLAN functions in the bottom two layers of the IEEE 802.11
standard does not mean that new features cannot be added to the existing upper layers.
A new feature can be added as long as it does not modify the two lower layers. In this
chapter students will learn about the three types of WLAN configurations, and look in
detail at the IEEE 802.11 MAC layer standard that implements WLAN features. They
will also learn about enhanced features in the Network layer that can provide benefits
for mobile wireless computing.
Chapter Objectives




List and define the three types of WLAN configurations
Tell the function of the MAC frame formats
Explain the MAC procedures for joining, transmitting, and remaining connected to a
WLAN
Describe the functions of Mobile IP
Teaching Tips
IEEE Wireless LAN Configurations
1. Provide an overview of the three IEEE WLAN configurations.
Basic Service Set
1. Explain that a Basic Service Set (BSS) is defined as a group of wireless devices that is
served by a single access point (AP). Mention that the BSS must be assigned a Service
Set Identifier (SSID), which serves as the “network name” for the BSS. Illustrate a BSS
with Figure 5-1.
Teaching
Tip
The SSID can be any alphanumeric string from 2 up to a maximum of 32
characters.
CWNA Guide to Wireless LANs, Second Edition
5-3
2. Define the term basic service area (BSA). Explain that the BSA for a wireless LAN
depends on many factors.
Teaching
Tip
The diameter of the BSA for a BSS with two stations will be somewhere in the
range of twice the coverage-distance between two wireless stations.
3. Discuss the concept of dynamic rate shifting.
4. Explain that 802.11g networks have a similar BSA to 802.11b networks, while 802.11a
networks have a smaller BSA.
Teaching
Tip
Although it is possible for a single 802.11b BSS to support up to 100 devices,
having this many users in a single BSS will probably result in unacceptable
throughput rates because the devices all share the same medium (similar to an
Ethernet network using a hub instead of a switch). Some industry experts
recommend that a single BSS should have no more than 50 devices if the users
are performing basic network functions, or 20 devices if users often transfer large
files across the network.
Teaching
Tip
A portal is a device that interconnects between an 802.11 and another 802 LAN.
Extended Service Set
1. Explain that an Extended Service Set is comprised of two or more BSS networks that
are connected through a common distribution system. Illustrate with Figure 5-2.
Mention that ESS can accommodate additional users over a wider area.
2. Explain that in ESS, APs can be positioned so that the cells overlap to facilitate
roaming. Define the term handoff. Explain that mobile wireless devices generally
choose an AP to which to connect based on signal strength.
Teaching
Tip
One of the weaknesses of the IEEE 802.11 standard is that it does not specify
how a handoff should take place. Because roaming between APs of different
vendors can sometimes be a problem, some industry experts recommend that all
APs in an ESS be from the same vendor.
Teaching
Tip
In an ESS, the entire network looks like an independent basic service set to the
Logical Link Control layer (LLC). This means that stations within the ESS can
communicate or even move between BSS's transparently to the LLC.
CWNA Guide to Wireless LANs, Second Edition
Teaching
Tip
5-4
In an ESS, each access point is assigned a different channel wherever possible to
minimize interference. If a channel must be reused, it is best to assign the reused
channel to the access points that are the least likely to interfere with one another.
Independent Basic Service Set
1. Explain that an Independent Basic Service Set is a wireless network that does not use an
access point. Mention that IBSS is also referred to as peer-to-peer or ad hoc mode.
Illustrate with Figure 5-3.
2. Explain that BSS has more flexibility than IBSS in being able to connect to other wired
or wireless networks. Mention that IBSS is useful for quickly and easily setting up a
wireless network anywhere that users need to share data between themselves but do not
need a connection to the Internet or an external network.
IEEE 802.11 Media Access Control (MAC) Layer Standards
1. Provide an overview of the functions of the MAC layer in a WLAN. Mention that the
mechanics of how these functions are performed center around the frames sent and
received on a WLAN.
MAC Frame Formats
1. Define the term packet. Explain that, strictly speaking, other terms are actually used to
describe the smaller segments of data transmitted on a network.
2. Discuss the concept of frames as they relate to the MAC Layer. Stress that IEEE MAC
frames are not the same as 802.3 Ethernet frames.
3. Briefly discuss the purpose and contents of the control field of a frame. Mention that all
frames contain the MAC address of the source and destination device, a frame sequence
number, and a frame check sequence used for error detection.
4. Describe the purpose of management frames. Illustrate the format of a management
frame with Figure 5-4. Describe the purpose of each field illustrated in this Figure.
5. Using the list on page 158 of the text as a guide, discuss some of the types of
management frames and their functions.
6. Explain the purpose and role of control frames. Illustrate an example of the format of a
control frame with Figure 5-5.
7. Discuss the purpose and role of data frames. Illustrate a data frame with Figure 5-6, and
discuss the purpose of the fields in this type of frame. Mention that the exact contents of
a data frame will vary depending on the mode of transmission.
Discovering the WLAN
1. Provide an overview of the process of discovering a WLAN.
CWNA Guide to Wireless LANs, Second Edition
5-5
Beaconing
1. Describe the process of beaconing. Explain that a beacon frame is a type of
management frame and its format follows the standard management frame format.
Illustrate the process of beaconing with Figure 5-7.
2. Using the list on pages 160 and 161 of the text as a guide, discuss the fields contained in
a beacon frame.
Teaching
Tip
To increase security many access point vendors have included an option to
disable the SSID from being broadcast in beacon frames. This will be covered in
detail in Chapter 7.
3. Explain that in an ad hoc network each wireless device assumes the responsibility for
sending the beacon. Discuss the process of beaconing on this type of network.
4. Describe the standard beacon interval on an infrastructure WLAN, and discuss how
adjusting this interval can affect the network.
Teaching
Tip
If a beacon frame is delayed because of other network traffic, the actual time
between beacons may be longer than the beacon interval. However, wireless
devices can compensate by resynchronizing with the timestamp in the next
beacon.
Scanning
1. Describe the purpose of scanning. Briefly introduce the two types of scanning (passive
and active).
2. Discuss passive scanning. Explain that wireless devices simple listen for a beacon
frame, and typically scan all available channels for a set time period. Discuss the
differences between scanning on a BSS versus an ESS.
Teaching
Tip
Even after a wireless device is connected to a wireless network it continues to do
passive scanning (remember that beacon frames are broadcast to all network
devices). In the event that the device is disconnected from the wireless network,
it can use that information to reconnect more quickly.
3. Discuss the process of active scanning. Illustrate with Figure 5-8.
4. Explain that in an ESS configuration with multiple access points, the device wanting to
join a network might have many different access points from which to choose. Discuss
some of the criteria that may be used in making this choice.
CWNA Guide to Wireless LANs, Second Edition
Teaching
Tip
5-6
If a device has not been configured to connect with a specific access point, it will
generally connect with the access point from which it has received the strongest
radio signal. However, on some occasions a device may try to connect to an AP
based on the first signal that it encounters.
5. Stress that the difference between passive scanning and active scanning is which device
initiates the discovery.
Joining the WLAN
1. Provide a brief overview of the two-step process of joining a WLAN.
Authentication
1. Mention that in a wired LAN, the user is authenticated after the network device is
already connected to the network. Explain that, in contrast, a wireless device (not
individual user) must be authenticated prior to being connected to the network. Define
the term authentication, as it relates to IEEE 802.11 standards.
2. Describe the process of open system authentication, mentioning that it is the most basic
(and the default) method of authentication. Explain how open system authentication is
performed. Illustrate with Figure 5-9.
3. Describe the process of shared key authentication. Define the term challenge text.
Illustrate with Figure 5-10. Mention that this type of authentication is based upon the
fact that only pre-approved wireless devices are given the shared key.
Teaching
Tip
The secret key is sometimes called the “shared secret.”
Teaching
Tip
Shared key authentication uses a WEP privacy algorithm.
4. Stress that both of the previously discussed authentication methods are weak, and
explain why.
5. Discuss the concept of a digital certificate, and explain how it might be used on a
wireless network. Stress that it is not possible to change any part of a digital certificate
without being detected.
Association
1. Define the term association. Explain that it is the final step in joining a wireless
network.
2. Explain that after the authentication process, the AP sends an association response
frame, which contains either an acceptance or rejection notice. Mention the information
contained in the association response frame.
CWNA Guide to Wireless LANs, Second Edition
5-7
Quick Quiz 1
1. A(n) ____________________ is defined as a group of wireless devices that is served by
a single access point (AP).
Answer: Basic Service Set (BSS)
2. A(n) ____________________ is comprised of two or more BSS networks that are
connected through a common distribution system.
Answer: Extended Service Set (ESS)
3. True or False: IEEE MAC frames are the same as 802.3 Ethernet frames.
Answer: False
4. ____________________ frames are used to set up the initial communications between a
device and the access point (for infrastructure mode) or between devices (ad hoc mode),
and then maintain the connection.
Answer: Management
5. The ____________________ field of a beacon frame identifies a specific wireless
LAN.
Answer: Service Set Identifier (SSID)
6. With ____________________ scanning a wireless device simply listens for a beacon
frame.
Answer: passive
7. ____________________ authentication is the most basic and the default authentication
method supported by the 802.11 standard.
Answer: Open system
8. ____________________ are digital documents that associate an individual with a key
value.
Answer: Digital certificates
Transmitting on the WLAN
1. Explain that the MAC layer has the primary responsibility of controlling access to the
wireless medium. Briefly introduce the two procedures for transmitting on a WLAN
specified by the IEEE 802.11 standard.
Distributed Coordination Function (DCF)
1. Define the term channel access methods.
2. Describe the concept of contention, explaining that the philosophy of contention is to
have computers compete for access to the network medium. Explain that any computer
can send a message at any time, but collisions may results. Discuss the methods that can
be employed to avoid collisions.
CWNA Guide to Wireless LANs, Second Edition
5-8
3. Explain that CSMA/CD specifies that before a networked device starts to send a frame
it should first listen on the wire to see if any other device is currently transmitting.
Describe what happens if traffic is detected, if it is not detected, and if two devices
listen at exactly the same time. Mention how collisions are handled when they do occur.
Illustrate with Figure 5-11.
4. Explain the reasons why CSMA/CD cannot be used on wireless networks. Illustrate the
hidden node problem with Figure 5-12.
5. Discuss the Distributed Coordination Function in detail. Explain that it is a modified
version of CSMA/CD that attempts to avoid collisions altogether rather than simply
detecting them.
6. Explain why most collisions occur immediately after a station completes a transmission.
Explain that with CSMA/CA, all stations are forced to wait a random amount of time
after the transmission medium is clear, mentioning how this significantly reduced the
number of collisions.
7. Discuss how CSMA/CA uses explicit acknowledgement frames to further reduce
collisions. Illustrate with Figure 5-13.
8. Explain that CSMA/CA does not eliminate the potential for collisions, mentioning that
the hidden node problem is not solved. Explain that the Request to Send/Clear to Send
(RTS/CTS) protocol can be used to solve the hidden node problem and provides
additional protection against collisions. Discuss this protocol with the aid of Figure 514.
Teaching
Tip
Request to Send (RTS) and Clear to Send (CTS) frames are control frames, not
management frames.
9. Stress that the RTS/CTS protocol imposes significant overhead upon the WLAN with
the transmission of its RTS and CTS frames, especially with short packets. Explain that,
when using RTS/CTS, the 802.11 standard allows the transmission of small data
packets without RTS/CTS. Discuss the concept of the RTS threshold.
Teaching
Tip
Because the RTS/CTS protocol imposes additional overhead, it is not used unless
there is no other way to improve network performance. Before using RTS/CTS,
the first approach might be to move the devices or access point if possible so that
the devices can sense each other’s transmissions.
Interframe Spacing
1. Introduce the concept of interframe spacing. Discuss the three types of interframe
spaces.
2. Using Figure 5-15 to illustrate, discuss the sequence of event involved in a transmission
by a wireless device using direct sequence spread spectrum (DSSS) that has been
assigned three slot times.
CWNA Guide to Wireless LANs, Second Edition
5-9
3. Using Figure 5-16 to illustrate, discuss how the situation is complicated when two
stations need to transmit.
Fragmentation
1. Explain that Fragmentation involves dividing the data to be transmitted from one large
frame into several smaller ones, mentioning that this technique can also reduce
collisions.
There are several reasons why it is preferable to use smaller packets in a
Wireless LAN environment. Some reasons include:
- Due to the higher Bit Error Rate of a radio link, the probability of a packet
getting corrupted increases with the packet size.
Teaching
Tip
- In case of packet corruption (either due to collision or noise), the smaller the
packet, the less overhead it causes to retransmit it.
- On a Frequency Hopping system, the medium is interrupted periodically for
hopping, so, the smaller the packet, the smaller the chance that the transmission
will be postponed after dwell time.
2. Explain that if the length of a data frame to be transmitted exceeds a specific value, the
MAC layer will divide or fragment that frame into several smaller frames. Discuss how
these fragments are labeled, and mention that the receiving station uses the labels to
reassemble the fragments.
Teaching
Tip
The fragmentation frame size can be adjusted and is typically between 256 and
2,346 bytes.
3. Explain that fragmentation can be considered as an alternative to RTS/CTS, but that it
also has high overhead. Mention that, because of the overhead requirements of both
RTS/CTS and fragmentation, these techniques should only be used if absolutely
necessary
Teaching
Tip
Fragmentation does not always have to be used separately from RTS/CTS. The
802.11 standard permits them to be used simultaneously.
Teaching
Tip
To minimize overhead on the network, 802.11 does not fragment broadcast (e.g.,
beacons) and multicast frames.
Point Coordination Function (PCF)
1. Describe the concept of polling as a channel access method. Stress that it effectively
prevents collisions.
CWNA Guide to Wireless LANs, Second Edition
5-10
2. Explain that the IEEE 802.11 standard specifies the Point Coordination Function as the
mechanism for implementing polling. Mention that, with PCF, the access point serves
as the polling device or “point coordinator.”
3. Explain that the point coordinator only has to wait through the point coordination
function IFS (PIFS) time gap, which is shorter than the DFIS time gap. Illustrate with
Figure 5-17.
4. Explain that if the point coordinator hears no traffic at the end of the PIFS time gap, it
sends out a frame, known as a beacon frame, to all stations. Mention that one field of
this frame contains a value that indicates the length of time that PCF (polling) will be
used instead of DCF (contention), and that after the stations receive this beacon frame
they must stop any transmission for that length of time.
Teaching
Tip
Stations that receive the beacon frame store the length of time field for PCF in
their own NAV field.
5. Explain that because each station can be told the length of time that PCF will be used
instead of DCF, the 802.11 standard allows a WLAN to alternate between PCF (polling)
and DCF (contention). Illustrate with Figure 5-18.
Teaching
Tip
PCF always has a higher priority than DCF.
Quality of Service (QoS) and 802.11e
1. Explain that DCF works well for data transmissions, but not for real-time traffic that is
time dependent. Explain how QoS proposes to solve this problem. Mention the role that
VoIP has played in the interest in QoS.
Teaching
Tip
According to Infonetics Research, the number of large enterprises that use VoIP
will increase an additional 33 percent by 2006.
2. Discuss the difficulties that have been encountered while trying to implement QoS on
wireless networks. Using Table 5-1 as a guide, discuss the WMM specification
proposed by the Wi-Fi Alliance.
3. Discuss the 802.11e draft, explaining that it intends to provide QoS over WLANs.
Describe EDCA, mentioning that it proposes to use four access categories to
differentiate between types of traffic. Explain that HCCA is a new form of PCF,
intended to serve as a centralized scheduling mechanism.
Remaining Connected to the WLAN
1. Provide a brief overview of the role that the MAC Layer plays in keeping stations
connected to the WLAN.
CWNA Guide to Wireless LANs, Second Edition
5-11
Reassociation
1. Explain that reassociation occurs when a device drops the connection with one access
point and establish a connection with another.
2. Discuss the various reasons why reassociation may be necessary.
3. Describe how a device initiates the reassociation process. Mention that it can use
information from previous scans. Discuss how, once a new AP is located, reassociation
proceeds.
Teaching
Tip
Reassociation is always initiated by the station and never by the access point.
Power Management
1. Explain that when that laptop is part of a WLAN it must continue to remain “awake” in
order to receive network transmissions.
2. Discuss power management, as it relates to the 802.11 standards. Explain that power
management is transparent to all protocols and applications so that it will not interfere
with normal network functions.
3. Explain that the process of power management differs based on the WLAN
configuration. Discuss the concepts of buffering and the traffic indication map.
Illustrate power management in infrastructure mode using Figure 5-19.
Teaching
Tip
The amount of sleep time for a mobile station is generally 100 milliseconds,
although this parameter can be changed.
4. Discuss how power management operates in an Ad Hoc configuration. Explain the
events that occur at the ad hoc traffic indication message window.
5. Explain that laptops that are plugged in are in continuous aware mode, and discuss the
consequences of this fact.
6. Mention that power management can slow network response time.
WLAN Network Layer Standards
1. Provide an overview of WLAN Network Layer standards. Explain that the IEEE 802.11
standard specifies that the features of a WLAN be confined to the PHY and MAC
layers. Mention that a Network Layer enhancement is emerging that will extend
mobility while not altering the existing standard.
WLAN IP Addressing
1. Provide a review of the purpose of IP addresses and the role that they play in standard
networking. Stress that the traditional TCP/IP scheme prohibits a mobile user from
switching to another network and using the same IP number.
CWNA Guide to Wireless LANs, Second Edition
5-12
Mobile IP
1. Explain that mobile IP provides a mechanism within the TCP/IP protocol to support
mobile computing. Stress that it does not alter the TCP/IP protocol suite.
2. Explain that in mobile IP, computers are given a home address, and that the computer
also has a home agent. Mention that the home agent is a forwarding mechanism that
keeps track of where the mobile computer is located.
Teaching
Tip
A home agent can be a router, firewall, or gateway.
3. Discuss the concept of a foreign network, and explain the role of a foreign agent.
Illustrate with Figure 5-20. Mention that the foreign agent assigns the mobile computer
a care-of address, and that this address is then registered with the home agent. Illustrate
with Figure 5-21.
4. Explain how the home agent tunnels frames to a foreign agent, which then transmits the
frame to the computer on the foreign network. Illustrate with Figure 5-22.
Quick Quiz 2
1. True or False: CSMA/CD cannot be used for wireless networks.
Answer: True
2. With wireless CSMA/CA the amount of time that a station must wait after the medium
is clear is called the ____________________.
Answer: slot time
3. The ____________________ is the time used by a device to access the medium after it
has been asked and then given approval to transmit.
Answer: Point Coordination Function IFS (PIFS)
4. ____________________ involves dividing the data to be transmitted from one large
frame into several smaller ones.
Answer: Fragmentation
5. The capability to prioritize
____________________.
Answer: Quality of Service (QoS)
different
types
of
frames
is
known
as
6. When a device drops a connection with one access point and establishes a connection
with another, it is referred to as ____________________.
Answer: reassociation
CWNA Guide to Wireless LANs, Second Edition
5-13
Class Discussion Topics
1. Have the students read the paper entitled Techniques to Reduce IEEE 802.11b MAC
Layer Handover Time (April 2003) authored by Héctor Velayos and Gunnar Karlsson at
the Royal Institute of Technology in Stockholm, Sweden. This paper can be found
online at:
www.it.kth.se/~hvelayos/papers/TRITA-IMIT-LCN%20R%2003
02%20Handover%20in%20IEEE%20802.pdf
Once they have read the paper, lead a discussion of the techniques presented in this
paper for improving the handoff time at the MAC layer. Are the students able to
understand the concepts presented in this paper? Do they think that these techniques are
feasible in a non-laboratory environment? Do they think that they would be able to
implement these techniques given what they have learned so far in this course?
2. Have the students read the paper entitled Quality of Service Schemes for IEEE 802.11
Wireless LANs – An Evaluation (2003) authored by Anders Lindgren, Andraes
Almquist and Olev Schelen at the Luleå University of Technolog in Luleå, Sweden.
This paper can be found online at:
http://www.cs.ucsb.edu/~ebelding/courses/595/s05/papers/qos_schemes
Once they have read the paper, lead a discussion of the evaluation of QoS techniques
presented in this paper. Are the students able to understand the concepts presented in
this paper? Do they agree with the metrics used, and if not, what other types of metrics
do they feel would be useful and enlightening? According to the paper, what are the
advantages and disadvantages of various QoS schemes?
Additional Projects
1. The implementation of the distribution system connecting two BSSs is not specified by
802.11. Therefore, a distribution system may be created from existing or new
technologies. However, the 802.11 standard does specify the services that the
distribution system must support. Have the students research online to find out what
services must be supported. Have them write a short report detailing these services
(some of these services were detailed in this chapter).
2. A good method to find out if you should activate fragmentation is to monitor the
wireless LAN for collisions. Have the students first determine the number of collisions
that occur over a 30 minute time frame (can be achieved using Cisco Aironet client
adapter tools). Next, have them adjust the fragmentation threshold to various levels and
recheck the number of collisions that occur over a 30 minute time frame. The students
should chart the number of collisions as a function of the fragmentation threshold, and
estimate what the optimum collision threshold is for the WLAN. It would be best if this
network was performed during periods of high network traffic.
CWNA Guide to Wireless LANs, Second Edition
5-14
Additional Resources
1. IEEE 802.11 architecture:
http://www.wirelessnetworkstutorial.info/ieee802.11/wifi_architecture.php
2. Wireless LAN setup in Extended Service Set (ESS) mode (PDF):
http://www.comp.nus.edu.sg/~cs3103/labs/lab_802_11.pdf
3. IEEE 802.11 Technical Tutorial (PDF):
http://www.alvarion-usa.com/RunTime/Materials/KnowledgePoolFiles/
C3_IEEE_80211_Technical_Tutorial.pdf
4. Scanning 802.11 Networks:
http://msdn.microsoft.com/library/default.asp?url=/library/enus/network/hh/network/213_802.11_bb61b6ee-e9ab-4f03-aee3-c932fe2ea2a9.xml.asp
5. IEEE 802.11 Tutorial (PDF):
http://esoumoy.free.fr/telecom/tutorial/ieee-tutorial.pdf
6. Improving WLAN Performance with Fragmentation:
http://www.wi-fiplanet.com/tutorials/article.php/1468331
7. 802.11 Beacons Revealed:
http://www.wi-fiplanet.com/tutorials/article.php/1492071
8. Improving WLAN Performance with RTS/CTS:
http://www.wi-fiplanet.com/tutorials/article.php/1445641
9. Understanding 802.11 Frame Types:
http://www.wi-fiplanet.com/tutorials/article.php/1447501
10. Quality of Service Schemes for IEEE 802.11 Wireless LANs – An Evaluation (PDF):
http://www.cs.ucsb.edu/~ebelding/courses/595/s05/papers/qos_schemes
11. Mobile Networking Through Mobile IP:
http://www.computer.org/internet/v2n1/perkins.htm
12. Cisco Aironet: Performing Diagnostics:
http://www.cisco.com/en/US/products/hw/wireless/ps4555/products_installation_and_c
onfiguration_guide_chapter09186a0080154ed8.html
Key Terms
 802.11e: A IEEE draft outlining Quality of Service specifications for 802.11 WLANs.
 Access categories (AC): Streams of communication in an Enhanced Distributed
Channel Access (EDCA) protocol.
 Active scanning: The process in which a wireless device first sends out a management
probe request frame on each available channel and then waits for an answer.
 Ad hoc mode: A wireless network that does not use an access point. Also known as
peer-to-peer mode or Independent Basic Service Set (IBSS).
 Ad hoc traffic indication message (ATIM) window: A specific period of time at
which each ad hoc device must be awake.
 Association: The process of being accepted into the wireless network.
 Authentication: A process in which the AP accepts or rejects a wireless device.
 Backoff interval: The random amount of time that a device waits after a network
collision.
 Basic Service Area (BSA): The geographical area of coverage for a WLAN.
 Basic Service Set (BSS): A group of wireless devices that is served by a single access
point (AP).
CWNA Guide to Wireless LANs, Second Edition
5-15
 Beaconing: The process of an AP in an infrastructure network or wireless device in an
ad hoc network sending a beacon frame to both announce its presence and to provide
the necessary information for other devices to join the network.
 Buffering: The process of an access point temporarily storing frames for wireless
devices that are asleep.
 Care-of address: A new IP address on a foreign network.
 Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA): A protocol
designed to avoid collisions on a wireless medium.
 Carrier Sense Multiple Access with Collision Detection (CSMA/CD): A contentionbased channel access method used by 802.3 Ethernet networks.
 Carrier sensing: The process of listening on a network medium prior to transmitting.
 Challenge text: A block of text that must be encrypted by a wireless device in shared
key authentication.
 Channel access methods: Different ways of sharing a network medium.
 Contention: A channel access method in which devices compete with each other to use
the network medium.
 Continuous aware mode (CAM): The state of a laptop when it is connected to
standard alternating current (AC) for power.
 Control frame: MAC frame that provides assistance in delivering the frames that
contain the data.
 Data frame: MAC frame that carries the information to be transmitted to the
destination device.
 Digital certificate: Digital documents that associate an individual with a key value.
 Distributed Coordination Function (DCF): An IEEE 802.11 standard for sharing the
wireless medium.
 Distributed Coordination Function IFS (DIFS): An interframe space that is the
standard interval between the transmission of data frames.
 Dynamic rate shifting: The decrease in transmission speed as a mobile device moves
farther away from the access point.
 Enhanced Distributed Channel Access (EDCA): An IEEE 802.11e draft which is
contention-based yet supports prioritization of different types of traffic.
 Extended Service Set (ESS): Two or more BSS networks that are connected through a
common distribution system.
 Foreign agent: A forwarding mechanism in Mobile IP.
 Foreign network: Another network on a Mobile IP service.
 Fragmentation: The process of dividing data to be transmitted from one large frame
into several smaller ones.
 Frame: The formal name for a packet that has reached the MAC layer (or the Data Link
layer in the OSI model).
 Frame acknowledgment: A frame (abbreviated ACK) that is sent by the receiving
device back to the sending device to confirm that the data frame arrived intact.
 Handoff: The process of switching associations from one access point to another.
 Hidden node problem: A wireless device that can be seen by an access point but not
by all other wireless devices.
 Home agent: A forwarding mechanism in Mobile IP that keeps track of where a mobile
computer is located.
 Hybrid Coordination Function Controlled Channel Access (HCCA): A proposed
IEEE 802.11e protocol based upon polling.
CWNA Guide to Wireless LANs, Second Edition
5-16
 Independent Basic Service Set (IBSS): A wireless network that does not use an access
point. Also known as ad hoc or peer-to-peer mode.
 Infrastructure mode: A group of wireless devices that is served by a single access
point (AP).
 Interframe spaces (IFS): Standard spacing intervals between the transmissions of the
data frames used for special types of transmissions.
 Management frame: A type of MAC frame used to set up the initial communications
between a device and the access point or between devices.
 Mobile IP: A mechanism within the TCP/IP protocol to support mobile computing.
 Net allocation vector (NAV): The location in an access point or wireless device that
contains the length of time a medium is reserved.
 Open system authentication: An authentication method in which a wireless device
sends a request to the access point. The most basic and often default authentication
method, it provides very little security.
 Passive scanning: The process of a wireless device listening for a beacon frame.
 Peer-to-peer mode: A wireless network that does not use an access point.
 Point Coordination Function (PCF): An optional 802.11 transmission process in
which the access point serves as the polling device or point coordinator.
 Point Coordination Function IFS (PIFS): An interframe space that is used by a
device to access the medium after it has asked for and then been given approval to
transmit.
 Polling: A channel access method in which each device is polled in sequence if it has
frames to send.
 Power management: An 802.11 standard that allows mobile devices to be off as much
as possible to conserve battery life but not miss data transmissions.
 Quality of Service (QoS): Prioritizing frames so that time-sensitive frames are
transmitted prior to data frames.
 Reassociation: The process in which a device drops a connection with one access point
and establishes a connection with another.
 Request to Send/Clear to Send (RTS/CTS): Also known as carrier sensing, a protocol
that reserves the wireless medium for transmissions so that no collisions may occur.
 Roaming: Movement between WLAN cells.
 RTS threshold: A limit on packet size of the RTS/CTS protocol.
 Scanning: The process of a receiving wireless device looking for beacons.
 Service Set Identifier (SSID): A unique identifier of up to 32 characters that serves as
a WLAN network name.
 Shared key authentication: An authentication method in which a wireless device must
encrypt challenge text before it can be authenticated. This method is more secure than
open system authentication, but still not entirely secure.
 Short IFS (SIFS): An interframe space that is used for immediate response actions
such as ACK.
 Slot time: The amount of time that a station must wait after the medium is clear.
 Traffic indication map (TIM): A list of the stations that have buffered frames waiting
at the access point.
 Virtual carrier sensing: Also known as RTS/CTS, the process of reserving the
wireless medium for transmissions so that no collisions may occur.
 Voice over IP (VoIP): A telephony service that uses IP-based data packet switching
networks to transmit voice communications.
 Wi-Fi Multimedia (WMM): A Wi-Fi Alliance specification for prioritizing frames.
Download