wireless local area networks

50
Wireless Local Area Networks CS5440 Wireless Access Networks Dilum Bandara [email protected] Some slides extracted from Dr. Muid Mufti, ID Technologies

Upload: dilum-bandara

Post on 13-Jun-2015

350 views

Category:

Engineering


3 download

DESCRIPTION

Introduction to Wireless Local Area Networks (WLANs). Cover IEEE 802.11a, 802.11b, 802.11g, 802.11n, 802.11i, 802.11x, and deployment & security issues

TRANSCRIPT

Page 1: Wireless Local Area Networks

Wireless Local Area Networks

CS5440 Wireless Access Networks

Dilum Bandara

[email protected]

Some slides extracted from Dr. Muid Mufti, ID Technologies

Page 2: Wireless Local Area Networks

2

Outlines Motivation IEEE 802.11 Practical issues Security

Page 3: Wireless Local Area Networks

Wireless Technology Landscape

3

Page 4: Wireless Local Area Networks

4

Wireless Local Area Network (WLAN) As a cable replacement Motivating factors

Mobility Old buildings Rapid deployment Rapid reconfiguration Small devices

Applications

Page 5: Wireless Local Area Networks

5

Why Not Wireless Ethernet? Ethernet is simple, widely used, & cheap But

Collision detection Not possible in wireless Would require a full duplex radio Receiver sensitivity

Carrier sense Hidden stations

Mobility Power saving

Page 6: Wireless Local Area Networks

6

Elements of a WLAN Client Access point – base station Modes

Ad-hoc infrastructure

Source: www.technologyuk.net

Page 7: Wireless Local Area Networks

7

WLAN Topologies Peer-to-peer Access point based Point-to-multipoint bridge

Source: www.cisco.com

Page 8: Wireless Local Area Networks

8

IEEE 802.11 Standard Standard for MAC & Physical Layer for WLANs

Page 9: Wireless Local Area Networks

IEEE 802.11 Standards

9

DSSS – Direct Sequence Spread Spectrum OFDM – Orthogonal Frequency-Division MultiplexingMIMO – Multiple Input Multiple Output

Page 10: Wireless Local Area Networks

10

IEEE 802.11 Versions 802.11 – 1997

2 Mbps max 2.4 GHz band 20 m – Indoor 100 m – outdoor Wide range of Physical layers

IR, UHF Narrowband, spread spectrum

802.11a – 1999 54 Mbps max 5.1 - 5.8GHz band 35 m – indoor 120 m – outdoor

Page 11: Wireless Local Area Networks

11

IEEE 802.11 Versions (Cont.) 802.11b – 1999

11 Mbps max 2.4 GHz band 35 m – indoor 140 m – outdoor

802.11g – 2003 Most current deployments 54 Mbps max 2.4 GHz band 38 m – indoor 140 m – outdoor

Page 12: Wireless Local Area Networks

12

IEEE 802.11 Versions (Cont.) 802.11n – 2009

Current industry adopted specification 320 Mbps 2.4/5 GHz band MIMO Enhanced security 70 m – indoor 250 m – outdoor

802.11ac – 2012 (approved in Jan 2014) 0.5+ Gbps (per links) 5 GHz band MIMO, 256 - QAM

Page 13: Wireless Local Area Networks

Comparison

13Source: http://electronicdesign.com/communications/understanding-ieee-80211ac-vht-wireless

Page 14: Wireless Local Area Networks

Comparison

14

Page 15: Wireless Local Area Networks

15

Source: http://www.os2warp.be/index2.php?name=wifi1

Page 16: Wireless Local Area Networks

16

IEEE 802.11 Topologies Independent Basic Service Set (IBSS) – ad-hoc Basic Service Set (BSS) Extended Service Set (ESS)

SSID – Service Set ID

BSSID – MAC of AP

ESSID – 32-byte String

Page 17: Wireless Local Area Networks

17

Services Station services

Authentication De-authentication Privacy Delivery of data

Distribution services Association Disassociation Reassociation Distribution Integration

Page 18: Wireless Local Area Networks

Association in 802.11

AP

1: Association request

2: Association response

3: Data traffic

Client

18

Page 19: Wireless Local Area Networks

Reassociation in 802.11 – Roaming

New AP

1: Reassociation request

3: Reassociation response

5: Send buffered frames

Old AP

2: verifypreviousassociation

4: sendbufferedframes

Client6: Data traffic

19

• 802.11 – Roaming algorithm not defined• 802.11f – Inter Access Point Protocol (IAPP)• 802.11r – Fast roaming• Still no solution for roaming across different domains

Page 20: Wireless Local Area Networks

20

Roaming Among Wi-Fi Hotspots Hotspots may be operated by different providers

WISP – Wireless Internet Service Provider WISPr – best practices for WISPs Authentication through web browser

Source: www.truconnect.com/blog/how-to-create-a-wi-fi-hotspot-with-a-mifi-device/

Page 21: Wireless Local Area Networks

21

Issues – Hidden Terminal B doesn’t know C exist

Page 22: Wireless Local Area Networks

22

Issues – Exposed Terminal A can’t communicate with D while B & C are

communicating

Page 23: Wireless Local Area Networks

23

Handshake Protocol Address hidden & exposed terminal problems RTS – Request To Send frame CTS – Clear To Send frame

Page 24: Wireless Local Area Networks

24

Virtual Channel Sensing in CSMA/CA

C (in range of A) receives RTS & based on information in RTS creates a virtual channel busy NAV NAV – Network Allocation Vector NAV indicates how long a station must defer from accessing

medium Saves power

D (in range of B) receives CTS & creates a shorter NAV

Page 25: Wireless Local Area Networks

25

802.11 Overhead

Channel contention resolved using backoff Nodes choose random backoff interval from [0, CW] Count down for this interval before transmission

Backoff & (optional) RTS/CTS handshake before transmission of data frame

Random backoff

Data Transmission/ACKRTS/CTS

Page 26: Wireless Local Area Networks

26

Fragmentation in 802.11

High wireless error rates long packets have less probability of being successfully transmitted

Solution MAC layer fragmentation with stop-and-wait protocol on

fragments

Page 27: Wireless Local Area Networks

27

Physical Layer DSSS

SYNC - Receiver uses to acquire incoming signal & synchronize receiver’s carrierSFD – Start of Frame DelimiterSignal – Which modulation scheme

11 channels – North America13 channels – Europe

Page 28: Wireless Local Area Networks

28Source: wikipedia.org

Page 29: Wireless Local Area Networks

29

802.11 Wireless MAC

Support broadcast, multicast, & unicast Uses ACK & retransmission to achieve reliability for

unicast frames No ACK/retransmission for broadcast or multicast

frames Distributed & centralized MAC access

Distributed Coordination Function (DCF) Point Coordination Function (PCF)

Page 30: Wireless Local Area Networks

30

IEEE 802.11 Mobility Standard defines following mobility types

No-transition – no movement or moving within a local BSS BSS-transition – station movies from one BSS in one ESS to another

BSS within the same ESS ESS-transition – station moves from a BSS in one ESS to a BSS in a

different ESS (continues roaming not supported)

ESS 1ESS 2

- Address to destination mapping- seamless integration of multiple BSS

Page 31: Wireless Local Area Networks

31

Why Security is More of a Concern in Wireless? No inherent physical protection

Physical connections between devices are replaced by logical associations

Broadcast communications Eavesdropping – transmissions can be overheard by anyone in

range Bogus message – anyone can transmit DoS – Jamming/interference Replaying previously recorded messages

Page 32: Wireless Local Area Networks

32

Further Issues

Access point configuration Default community strings, default passwords

Evil twin access points Stronger signal, capture user authentication

Renegade access points Unauthorised wireless LANs

Page 33: Wireless Local Area Networks

33

Authentication & Privacy To prevent unauthorized access & eavesdropping Realized by authentication service prior to access Open system authentication

Station wanting to authenticate sends authentication management frame

Receiving station sends back frame for successful authentication Supported in WEP

Shared-key authentication Secret, shared key received by all stations by a separate, 802.11

independent channel Stations authenticate by a shared knowledge of the key properties

Page 34: Wireless Local Area Networks

34

MAC ACLs & SSID Hiding

Access points have Access Control Lists (ACL) List of allowed MAC addresses

E.g., allow access to 00:01:42:0E:12:1F 00:01:42:F1:72:AE 00:01:42:4F:E2:01

But MAC addresses are sniffable & spoofable AP beacons without SSID

A client knowing a SSID may join AP A client send PROBE REQUEST with SSID, AP

MUST send a RESPONSE with its SSID

Page 35: Wireless Local Area Networks

35

802.11b Security Services

2 security services1. Authentication

Shared Key Authentication

2. Encryption Wired Equivalence Privacy (WEP)

Page 36: Wireless Local Area Networks

36

Wired Equivalence Privacy (WEP)

Shared key between stations & an AP Extended Service Set (ESS)

All APs will have same shared key No key management

Shared key entered manually into Stations APs Key management nightmare in large wireless LANs

Page 37: Wireless Local Area Networks

37

WEP – Shared Key Authentication When station requests association with an AP

AP sends random no to station Station encrypts random no

Uses RC4, 40-bit shared secret key & 24-bit initialization vector RC4 – software stream cipher

Encrypted random no sent to AP AP decrypts received message AP compares decrypted random no to transmitted random no

If numbers match, station has shared secret key RC4 subsequently used for data encryption Checksum for integrity But management traffic still broadcast in clear containing

SSID

Page 38: Wireless Local Area Networks

38

WEP – Shared Key Authentication

Source: technet.microsoft.com

Page 39: Wireless Local Area Networks

39

Wi-Fi Protected Access (WPA) Works with 802.11b, a, & g

Works with legacy hardware Fixes WEP’s problems 802.1x user-level authentication Temporal Key Integrity Protocol (TKIP)

RC4 session-based dynamic encryption keys Per-packet key derivation Unicast & broadcast key management 48-bit initialization vector with new sequencing method

Counter replay attacks Michael 64-bit Message Integrity Code (MIC)

Optional AES support to replace RC4

Page 40: Wireless Local Area Networks

40

WPA & 802.1x 802.1x is a general purpose network access control

mechanism WPA has 2 modes

1. Pre-shared mode, uses pre-shared keys

2. Enterprise mode, uses Extensible Authentication Protocol (EAP) with a RADIUS server making the authentication decision EAP is a transport for authentication, not authentication itself EAP allows arbitrary authentication methods For example, Windows supports

Page 41: Wireless Local Area Networks

41

802.11i – WPA2

Full implementation Adopted in September 2004

Replaced WPA with WPA2-AES in 2004 Backwards compatible with WPA

Uses AES-CCMP Advanced Encryption Standard – Counter Mode with

Cipher Block Chaining Message Authentication Code Protocol (CCMP)

Very Strong

Page 42: Wireless Local Area Networks

42

WPA2 (Cont.)

Robust Security Network (RSN) protocol for establishing secure communications Based on a mode of AES, with 128-bits keys & 48 bit

IV Adds dynamic negotiation of authentication &

encryption algorithms Allows for future changes

Requires new hardware

Page 43: Wireless Local Area Networks

43

RSN Protocol Wireless NIC sends a Probe Request Access point sends a Probe Response with an

RSN Information Exchange (IE) frame Wireless NIC requests authentication via one of

the approved methods Access point provides authentication for the

wireless NIC Wireless NIC sends an Association Request with

an RSN Information Exchange (IE) frame Access point send an Association Response

Page 44: Wireless Local Area Networks

44

WLAN Network Planning Network planning target

Maximize system performance with limited resources Including

coverage throughput capacity interference roaming security

Planning process Requirements for project management personnel Site investigation Computer-aided planning practice Testing & verifying planning

Page 45: Wireless Local Area Networks

45

Basic tools – power levels, throughput, error rate Laptop, tablet, & PDA Utility come with radio card Supports channel scan, station search Indicate signal level, SNR, transport rate

Advanced tools – detailed protocol data flows Special designed for field measurement Support PHY & MAC protocol analysis Integrated with network planning tools

Examples Procycle™ from Softbit, Oulu, Finland SitePlaner™ from WirelessValley, American

Field Measurements

Page 46: Wireless Local Area Networks

46

Capacity Planning – Example 802.11b can have 6.5 Mbps rate throughput due to

CSMA/CA MAC protocol PHY & MAC management overhead

More users connected, less capacity offered Example of supported users in different application cases

Environment Traffic content Traffic Load No of simultaneous users

11Mbps 5.5Mbps 2Mbps

Corporation Wireless LAN

Web, Email, File transfer

150 kbits/user 40 20 9

Branch Office Network

All application via WLAN

300 kbits/user 20 10 4

Public Access Web, Email, VPN tunneling

100 kbits/user 60 30 12

Page 47: Wireless Local Area Networks

47

Frequency Planning Interference from other WLAN systems or cells IEEE 802.11 operates at uncontrolled ISM band 14 channels of 802.11 are overlapping, only 3 channels are

disjointed, e.g., Ch 1, 6, & 11 Throughput decreases with less channel spacing Example of frequency allocation in multi-cell network

0

1

2

3

4

5

6

Offset25MHz

Offset20MHz

Offset15MHz

Offset10MHz

Offset5MHz

Offset0MHz

Mbit/s 11Mb if/frag 512

2Mb if/frag 512

2Mb if/frag 2346

Page 48: Wireless Local Area Networks

48

WLAN Technology Problems Data Speed

Effective throughput is still not enough Better with IEEE 802.11g/n

Interference Works in ISM band Share same frequency with microwave oven, Bluetooth, & others

Security Current WEP algorithm is weak – usually not ON!

Roaming No industry standard is available & propriety solution aren’t

interoperable Inter-operability

Only few basic functionality are interoperable, other vendor’s features can’t be used in a mixed network

Page 49: Wireless Local Area Networks

49

WLAN Implementation Problems Lack of wireless networking experience for most IT

engineer Lack of well-recognized operation process on network

implementation Selecting access points with “best guess” method Unaware of interference from/to other networks Weak security policy As a result, a WLAN may have

Poor performance (coverage, throughput, capacity, & security) Unstable service Customer dissatisfaction

Page 50: Wireless Local Area Networks

50

Summary Emerged as a replacement for wired LAN IEEE 802.11g is popular Many IEEE 802.11n devices are being deployed Data rate & security continue to improve Only a small subset of the available channels

can be effectively used No roaming access across different domains