Implementation & Evaluation of 802.11 Wireless Lans: Student'S Copy Written Nov 2008
Implementation & Evaluation of 802.11 Wireless Lans: Student'S Copy Written Nov 2008
Implementation & Evaluation of 802.11 Wireless Lans: Student'S Copy Written Nov 2008
11 Wireless LANs
Table of contents
3 ............................................................................................ INTRODUCTION 3 ........................................................................... BACKGROUND READING 3 ...................................................................................... 802.11 NETWORKS 4 ........................................................................................... PHYSICAL LAYER 4 ........................................................................................................MAC LAYER 5 .......................................... 802.11 MAC LAYER FUNCTIONS 8 ........................... WIRELESS LANS COVERAGE AND CONNECTIONS 8 ............................................ IDENTIFYING 802.11 NETWORKS ERROR! BOOKMARK NOT DEFINED..................................................................... MMM 10 ............. MEASURING THROUGHPUT VS. LOCATION 3.1 3.2 3.3 2.1 2.2 2.3 2.4 3 1 2
12 ............................................................................................................ TOPICS FOR DISCUSSIONS BANDWIDTH AND DELAY 3.4 ESTIMATIONS OF A WIRELESS LINK 13 14 ........................................................................................................... CONCLUSION AND DISCUSSION
1 Introduction
A wireless local area network (LAN) is a flexible data communication system implemented as an alternative or extension for a wired LAN. By utilising radio frequency technology, wireless LANs transmit and receive data via the air, allowing for minimising the need for wired connections. Consequently, wireless LANs
combine data connectivity with user mobility. Wireless LANs have gained strong popularity at homes and industries, due to their capability to deliver broadband services with minimum deployment costs. Wireless LANs offer the following efficiency, convenience, and cost advantages over traditional wired networks: Mobility: Wireless LAN systems can provide users with access to real-time information anywhere in their homes and organisations. This mobility supports
productivity and service opportunities not possible with wired networks. Installation speed and simplicity: Installing a wireless LAN system can be fast and easy and can eliminate the need to deploy cables through walls and ceilings. Cost effectiveness: While the initial investment required for wireless LAN hardware can be higher than the cost of wired LAN hardware, overall installation expenses and life-cycle costs can be significantly lower. Long-term cost benefits are greatest in dynamic environments requiring frequent moves and changes. Scalability: Wireless LAN systems can be configured in a variety of topologies to meet the needs of specific applications and installations. Configurations are easily changed and range from peer-to-peer networks (Ad-hoc) suitable for a small number of users to full Infrastructure networks of thousands of users that enable roaming over a broad area.
2 Background information
2.1 802.11 Networks
IEEE 802.11 is limited in scope to the Physical (PHY) layer and Medium Access Control (MAC) sub-layer. As shown in Fig.1, 802.11 networks may operate in either Ad-hoc or Infrastructure-based modes. In the former, wireless stations communicate with each other directly or when no direct link is feasible between two stations, a third station may act as a relay. In the latter, an access point (AP) serves as a local bridge,
where stations communicate via the AP that relays packets to/from stations. The Access point is not mobile and is connected to a wired backbone.
This prevents multiple stations from seizing the medium immediately after completion of the preceding transmission. Packet reception is acknowledged by the receiving station. The fundamental assumption is that every station can hear all other stations. However, as shown in Fig. 3, this is not always the case. In the figure, the AP is within range of the STA-A, but STA-B is out of range. STA-B would not be able to detect transmissions from STA-A, also referred as the Hidden Node and the probability of collision is greatly increased.
Fig 2
To combat this problem, a second carrier sense mechanism is available. Virtual Carrier Sense enables a station to reserve the medium for a specified period of time through the use of RTS/CTS frames. As shown in the figure, STA-A sends an RTS frame to the AP. The RTS will not be heard by STA-B. The RTS frame contains a duration/ID field which specifies the period of time for which the medium is reserved for a subsequent transmission. Upon receipt of the RTS, the AP responds with a CTS frame, which also contains a duration/ID field specifying the period of time for which the medium is reserved. Thus, collision is avoided even though some nodes are hidden from other stations. The RTS/CTS procedure is invoked according to a user specified parameter.
2.4.1 Scanning
The 802.11 standard defines passive and active scanning methods by which station scans individual channels to find APs. In passive scanning the station scans individual channels to find the best access point signal. The access points periodically
broadcasts a beacon, and the station receives these beacons while scanning and takes note of the corresponding signal strengths. The beacons contain information about the access point, including service set identifier (SSID), supported data rates, etc. The station can use this information along with the signal strength to compare access points and decide upon which one to use. Passive scanning is mandatory. In active scanning the station initiates the process by broadcasting a probe frame and all APs within range respond with a probe response. Active scanning enables a station to receive immediate response from APs without waiting for a beacon transmission. This method however imposes additional overhead on the network due to the transmission of probe and corresponding response frames.
2.4.2 Authentication
Authentication is the process of proving identity, for which the 802.11 standard specifies two forms: Open system authentication and shared key authentication. Open system authentication is mandatory, including a two step process. A station first initiates the process by sending an authentication request frame to the AP. Subsequently, the access point replies with an authentication response frame containing approval or disapproval of authentication indicated in the status code field in the frame body. Shared key authentication is an optional four step process that bases authentication on whether the authenticating device has the correct wired equivalent privacy (WEP) or WiFi protected access (WPA) keys. The station starts by sending an authentication request frame to the AP. The AP then places challenge text into the frame body of a response frame and sends it to the station. The station uses its key to encrypt the challenge text and then sends it back to the access point in another authentication frame. The AP decrypts the challenge text and compares it to the initial text. If the text is equivalent, the access point assumes that the station has the correct key. The AP finishes the sequence by sending an authentication frame to the station with the approval or disapproval.
2.4.3 Association
Once authenticated, the station must associate with the AP before sending data frames. Association is necessary to synchronise the station and AP with important information, such as supported data rates. The station initiates the association by sending an association request frame containing elements such as SSID and supported data rates. The access point responds by sending an association response frame containing an association ID along with other information regarding the AP. Once the stations wireless network interface card (NIC) and access point complete the association process they can send data frames to each other.
2.4.4 Fragmentation
The optional fragmentation function enables an 802.11 station to divide data packets into smaller frames. This is done to avoid needing to retransmit large frames in the presence of interference. The bits errors resulting from interference are likely to affect a single frame, and it requires less overhead to retransmit a smaller frame rather than a larger one. As with RTS/CTS, users can generally set a maximum frame length threshold whereby the station will activate fragmentation. If the frame size is larger than the threshold, the station will break the packet into multiple frames, with each frame no larger than the threshold value.
2.4.5 References
1. "IEEE 802.11 standard" on http://ieeexplore.ieee.org. 2. Jim Zyren and Al Petrick, IEEE 802.11 Tutorial, White Papers, Terabeam Wireless, 2004. 3. "WLANA - The Learning Zone for Wireless Networking", http://www.wlana.org/learn/80211.htm, 2006 4. Proxim, Inc,What is a Wireless LAN? , White Papers, Mar 1998, http://sssmag.com/pdf/proximwhatwlan.pdf
SSID
MAC
Band
WEP
Signal strength
Once you have listed and studied all available networks, note the networks named MiniX. These are the networks that will be used for this laboratory; wait to be told which network you will be using.
by going to advanced setting in windows wireless connections and under advanced settings tick use windows to configure m wireless network settings. This will allow you to disconnect and connect manually from the AP in order to observe packets relevant to joining the wireless network. Now, disconnect the computer from the AP using the windows wireless network connections. Then, to observe the packets run Wireshark by double clicking on the program shortcut located on the Desktop. In the program menu click on Capture and then interfaces. Then, after clicking on options button next to the wireless device, untick capture packets in promiscuous mode and click on start. Currently you should not see any packets since you are not yet
connected to the network. This time, reconnect to the AP and once the wireless station has associated successfully with the AP and has acquired an IP address on the new network, stop the capturing by clicking on the stop button located in the application toolbar. Observe the various management / control frames involved in the entire process by looking at the capture logs on Wireshark.
10
Entry #1 #2 #3 #4 #5 Mean
Size of file
Time to download
Throughput
Signal strength
Entry #1 #2 #3 #4 #5 Mean
Size of file
Time to download
Throughput
Signal strength
Entry #1 #2 #3 #4 #5 Mean
Size of file
Time to download
Throughput
Signal strength
11
Appendix A: Locations L1: Next to the group desk, very close the AP (results used as a reference). L2: Student gathering area in the beginning for D corridor, AP will be on the other side of the wall. L3: LD454, access point is located behind few walls and on a different floor.
12
For the following experiment you must describe your results, give the syntax of the command you used, and provide the output produced. This can be achieved by including screen captures. For each of the three locations, ping the same PC that you previously used to download the file, with different packet sizes to estimate link delay and packet loss rate. You are required to start with the smallest packet size and gradually increase its size while pinging (the maximum packet size is 65,500 bytes). For each step let the ping to operate for 30-60 sec and record when ping times out for more than 3 times. Now find out the time it takes for a single packet to reach from the other PC to your hand held (for this be aware of round trip time associated with ping). Then work out the maximum data throughput of the link for the maximum packet size that was successfully transmitted without timeouts. Record your results and compare them with the mean throughput found in the previous experiment.
13
14