Professional Documents
Culture Documents
Abstract
1 Introduction
2.0
2.1
2.2
2.3
2.4
802.115
802.11a 5
802.11b6
802.11g 7
802.11n....7
Ad-Hoc Network..9
13
Conclusion
EAP-SIM Authentication...............................................................17
References
19
18
Figure 1
An Ad-Hoc Network10
Table 2
Figure 2
Figure 3
Figure 5
EAP-SIM Architecture..18
Figure 4
Abstract
WLANs use radio frequencies (RF) instead of cables at the physical layer of the
data link layer. Wireless LANs has the capability of providing users with more
flexibility and freedom of movement within a location.
This report is focused on the critical evaluation of the various Wireless LANs
standards which have continuously improved from 802.11a to 802.11n and
1.0 Introduction
WLAN is a flexible data communication system, which can be used for
applications in which mobility is necessary or desirable. Using electromagnetic
waves, WLANs transmit and receive data over the air without relying on physical
IEEE 802.11 is a standard that defines how radio frequencies in the unlicensed
industrial, scientific, and medical (ISM) frequency bands are used for the
physical and the MAC sub layer of the wireless link.
2.0 802.11
In June 1997, the IEEE (Institute of Electrical and Electronics Engineers)
finalized the initial standard for Wireless LAN: IEEE 802.11. In this standard a
2.4 GHz band operating with data rates 1 Mbps and 2 Mbps is utilized. With the
initial IEEE 802.11 standard, two classes of spread spectrum modulation is used:
2.1 802.11a
The IEEE 802.11a standard was finalized in 1999 and it is comparable to
the Fast Ethernet of Ethernet and can reach speeds of 54 Mbps, compared
sent in parallel. 48 of these sub channels are used for data, with the
remaining four are reserved for error correction (Geier, 2002).
two significant benefits over 802.11b. First, the speed per channel is
4
Second, a 5 GHz bandwidth offered in 802.11a is larger than the 2.4 GHz
range used in 802.11b, which thereby reduces the issue of interference in
2.4 GHz.
required to cover the same area. While 802.11b access points has a
typical range of between 100 metres, 802.11a range is limited between
2.2 802.11b
IEEE 802.11b is the most popular standard in the 802.11x family. The
GHz signals, they are more able to penetrate physical barriers such as
walls and ceiling more effectively than 5 GHz frequency band. The
2.3 802.11g
IEEE 802.11g offers high- speed wireless communication to the 2.4 GHz
First, 802.11g works on the same 2.4GHz band as 802.11b, with the same
access point, and 802.11b cards will also work with an 802.11g access
point. In both of these setups, the 802.11b component is the limiting
factor, since its maximum speed is 11Mbps. To obtain the 54Mbps speeds,
both the network cards and the access point have to be 802.11g
them are unavoidable. And because they both use OFDM modulation, the
2.4 802.11n
IEEE 802.11n is one of the most important wireless technology
task group to begin the work on this specification (Perahia and Stacey
6
Another major advantage 802.11n has over other WLAN standards is its
interoperability with 802.11a or 802.11b/g technologies and it can
operate in either 2.4GHz or 5GHz.
Standard
802.11a
802.11b
802.11g
802.11n
Up to 23
OFDM
DSSS/CCK
2.4
2.4
54
11Mbps
54
100
150
150
250
Power
Medium
Medium
Medium
Medium
25
20
25
20 and 40
Access
CSMA/CA
CSMA/CA
CSMA/CA
CSMA/CA
Channels
Modulation
3
DSSS/OFDM/CCK MIMO /OFDM
2.4 and 5
Up to 600
3.0
Ad-Hoc Network
The ad-hoc network (also called Peer-to-Peer mode) is simply a set of Wireless
LAN workstations that communicate directly with one another without access
point or any connection to the wired network. For example, this ad-hoc network
can be formed by two laptops with a network interface card. There is no central
set up in a hotel room or in the airport or where access to wired network is not
available.
Building an ad-hoc network from the scratch is easy, since it requires little
ii.
3.1
Basic Service Set (BSS) is a set of workstations that communicate with one
another. A BSS does not generally refer to a particular location, due to the
purpose. And also when a BSS includes an access point (AP), the BSS is called
Infrastructure BSS (Mittal and Anand, 2014).
When there is an Access Point (AP), If one mobile station in the BSS must
communicate with another mobile station, the communication is sent first to the
AP and then from the AP to the other mobile station. This consume twice the
bandwidth that the same communication. While this appears to be at a great
cost, the benefits provided by the AP is far greater than the cost. The major
advantage of this is that Access Point (AP) buffers the traffic of mobile while that
station is operating in a very low power state.
Independent BSS
(Ad-Hoc network)
Infrastructure BSS
Access Point
Wired
LAN
STA1
STA1
STA2
STA2
STA3
STA4
3.2
STA3
One of the most desirable benefits of a WLAN is the mobility it provides to its
users. This mobility would not be of much use if it were confined to a single BSS.
IEEE 802.11 extends the range of mobility it provides to any arbitrary range
through the ESS. An ESS is a set of infrastructure BSSs, where the Access Points
communicate among themselves to forward traffic from one BSS to another and
to facilitate the movement of mobile workstation from one BSS to another. The
APs perform this communication via an abstract medium called the Distribution
Systems (DS). The DS is the backbone of the Wireless LAN and may be
back to a destination in the BSS, forwarded on the DS to another AP, or sent into
the wired network infrastructure to a destination not in the ESS.
The ESS and all of its mobile station all appear to be a single MAC sub layer
network where all STAs are physically stationary. The ESS hides the mobility of
the mobile STAs from everything outside the ESS. This level of indirection,
provided by the IEEE 802.11 architecture, allows existing network protocols that
have no concept of mobility to operate correctly with a WLAN where there is lots
of mobility (Mittal and Anand, 2014).
ESS
BSS
BSS
BSS
11
3.3
Wireless Bridging
open areas such as warehouses where wiring might be restricted or not cost
effective, and in some larger home environments. Wirelessly bridging multiple
Devices that have all been configured to use the same SSID (Service Set Identifier
or Wireless Network Name) will allow in effect Roaming for your Wireless
Client Adapters. When they are out of range of one device they will automatically
connect to another stronger signal. Wireless Bridges are a very practical, easy,
and in most cases inexpensive way to connect two different Ethernet LANs
together or extend the range of existing Wireless Networks. They are quick to set
up and relatively easy to configure.
Privacy (WEP) was the first security encryption technique introduced in the first
IEEE 802.11 standard and Wi-Fi Protected Access was introduced to solve the
12
security problems with WEP. WPA 2 also known as IEEE 802.11i was an
amendment to the 802.11 standard which specify wireless network security
improvement of WPA. We also have the Extensible Authentication Protocol
1999. Its intention was to provide basic level of data encryption and
authentication. WEP depend on a secret key that is shared between a
mobile station and access point (AP). The secret key is used to encrypt
data before they are transmitted and an integrity check is used to confirm
that data are not altered during transmission (Rappaport, 2002).
WEP enabled access point using RC4 encryption to verify its identity, then
the access point decrypts the encrypted text and checks if it matches
before access is granted to the client and for encryption provides a 24-bit
initialization vector.
13
IV
Initiation Vector
24bits
Data
Pad
Key ID
6bits
2bits
32bits
ICV
Fig. 4 Wireless Equivalent Privacy (WEP) Data Format (Borsc and Shinde 2005)
ii.
iii.
iv.
ii.
iii.
4.2
4.2.
There are two types of WPA and WPA 2 wireless network security. They
include: Enterprise mode and Personal Mode.
1. WPA and WPA 2 Enterprise Mode
WPA and WPA 2 Enterprise mode operates in a managed mode to meet
the rigorous requirements of enterprise security. It leverages the IEEE
802.1X
authentication
framework
which
uses
an
Extensible
RADIUS messages and then forward them to the RADIUS server. It then
receives this messages and processes it, once the supplicant and the
authenticator have the same secret master key, then the authentication
process is complete (Wi-Fi Alliance, 2005).
15
mode that uses a Pre-shared key (PSK) for authentication instead of IEEE
key. Consequently, it does not scale well in enterprise. The PSK is typically
shared among users.
Authentication in WPA and WPA 2 personal mode which does not require
an authentication server is performed between the client and AP
generating a 256-bit PSK from the plain text pass phrase (from 8 to 63
encryption methods as Enterprise mode. It supports per-user, persession, per-packet encryption via TKIP with WPA or AES with WPA2.
The table shown below states the comparison between WPA and WPA2 in
Enterprise and Personal Mode when considering there Authentication
and encryption technique.
Enterprise Mode
(Business& Government)
Personal mode
(SOHO /Personal)
WPA
WPA2
Encryption: TKIP/MIC
Authentication: PSK
Authentication: PSK
Encryption: TKIP/MIC
which are common in wireless networks include EAP-TLS, EAP-AKA, EAPTTLS, EAP-SIM and amongst others. EAP-SIM was developed by the 3rd
they include: Client device e.g. User terminal with SIM Card, 802.1X
used for connecting the AAA RADIUS to the HLR/AuC. When the user,
with the terminal, roams within range of the operators Wireless LAN
Access Point, the Access Point, and RADIUS server and Wireless client
During this process, the RADIUS Server links to the users HLR (which
authenticate the subscriber) and retrieves the GSM triplets that are used
to authenticate the user. If the users and the SIM card is able to validate
the GSM triplets correctly, the RADIUS server tells the AP to grant access
to the WLAN. Then the access point connects the users terminal to the
WLAN (Garderos Software Innovations GmbH, 2006).
during a user session and that secure algorithms are only known by the
HLR/ AuC and the SIM card.
17
Device
Supplicant
Access Point
802.1X hotspot
Authenticator
EAPSIM
RADIUS
GSM/MAP/
SS7
Gateway
HLR/HSS
Authentication
Server
Conclusion
In this critical report, we briefly discussed the various IEEE 802.11 Wireless LAN
standards with their advantages and drawbacks. We also evaluated the various
WLAN offers user mobility; users can access files, network resources, and the
Internet without having to physically connect to the network with wires. WLANs
18
References
Borsc, M and Shinde, H., (2005) Wireless Security and Privacy. IEEE international
Conference on personal Wireless Communications, pp. 424-428.
for Global system for mobile Communication (GSM) Subscriber Identity Modules
(EAP-SIM). pp. 1-90.
O' Hara, B and Petrick, A. (2004) IEEE 802.11 Handbook. 2nd Edition ed. london:
IEEE Press.
Perahia, E and Stacey, R. (2013) Next Generation Wireless LANs: 802.11n and
802.11ac. Second ed. Cambridge: Cambridge University Press.
Velte, T.J. and Velte, A.T. (2006) Cisco 802.11 Wireless networking Quick
Reference. Indianapolis: Cisco system, Inc.
19
Wi-Fi Alliance. (2005) Deploying Wi-Fi protected Access WPA and WPA 2 in the
enterprise. WPA and WPA 2 Implementation Paper, March.
20