wireless-comm
Revision | 1997 | A | B | G* | N** | AC |
---|---|---|---|---|---|---|
Year Adopted | 1999 | 1999 | 2003 | 2009 | ||
Max Throughput (Mbps) | 2 | 54 | 11 | 54 | 300 | 6.77 Gbps |
Frequency (GHz) | 2.4 | 5 | 2.4 | 2.4 | 2.4 and 5 | 5 |
Range (feet) | ~300 | ~150 | ~300 | ~300 | ~300 | ~300 |
Modulation | DSSS | OFDM | DSSS | OFDM | OFDM | |
Channels | ||||||
Channel Width (MHz) | 20 | 22 | 20 | 40 | 80 or 160 | |
CSMA/CA | ✔ | ✔ | ✔ | ✔ | ||
MIMO | ✔ | |||||
MU-MIMO | ✔ |
* 802.11g has a mixed mode allowing it to drop datarates to 11 Mbps and support DSSS when an 802.11b device joined the network. ** 802.11n supports b and n devices using mixed or legacy modes. If only n devices are connected then it runs in greenfield mode.
Works like an OSI Level 1 hub, but often incorporates other responsibilities like switching and routing. If the WAP is a gateway then it probably also has a DHCP server and NAT service.
This is a common name (not a 48 bit number) for a network. It is the human-readable network identifier, and it does not replace the BSSID or ESSID. The purpose of the SSID is for humans to configure the connection to the network. All hosts must have the same SSID to connect to each other in a WiFi network. The WAP will continuously broadcast the SSID so that hosts know they are connecting to the correct network.
Unlike in wired networks, Collision Detection is not possible. This is because wireless antenae cannot listen and send data simultaneously. Therefore, collisions can’t be detected. Instead, wireless networks need to avoid them. If a collision happens it is up to higher level applications (like TCP) to detect and remediate the issue.
Before a host can transmit data it must check to see if the radio frequency is already being used. If some other host is transmitting the host will wait for a backoff period and try again after. After transmission, a recieving host must send an ACK. The sender will continue to retransmit until the ACK is sent or the message times out.
A collision avoindance scheme that is no longer in use.
This is a standard introduced in 802.11n. It requires devices to have multiple antenae that can simultaneously connect to different channels
Implemented in 802.11ac. This allows different antennae to broadcast to different users simultaneously using different frequencies.
The process of breaking BSS or ESS into smaller VLANs. Hosts are randomly assigned to one of these VLANs. This decreases the number of devices in a broadcast domain.
A kind of code division multiple access. It sends data out on several frequencies simultaneously. Has better datarate than FHSS
This only sends one frequency at a time, but hops between frequencies. Has less interference than DSSS.
Different sub-channels are used to carry different signals. These sub-channels are chosen so that they are orthogonal to eachother. The orthogonality also allows high data thoughput, approaching the Nyquist rate.
A technique that allows for combining adjacent channels to increase the amount of available bandwidth
Methods for encrypting communication on a network. In general, remember that WPA is good but WPS and WEP should be avoided.
This is a relatively insecure method for securing a network. There are two methods for authenticating a new host:
A button is pushed on the WAP, then a button is pushed on the host. Configuration happens automatically. Downside is that you need physical access to the WAP, or a device already connected to the WLAN.
First a button is pressed on the WAP. Then, a preconfigured, 8-digit Personal Shared Key is entered into the host.
A RADIUS server is set up and WAPs act as edge Network Access Servers (NASs). EAP is a set of different protocols used to secure PPP authentication. They are different encryption protocols so that the user-name and password are not transmitted in the clear. The include: - EAP-PSK (Pre-Shared Key) - EAP-TLS (Highest level of security) - EAP-TTLS (Tunneled TLS) - EAP-MS-CHAPv2 - EAP-MD5 - LEAP (cisco) - EAP-Fast (cisco)
Encapsulates EAP in in a TLS Tunnel.
An easily cracked and no longer used standard. Has a static encryption key and a stream cipher that decreases key length. Also doesn’t provide user authentication. Used the RC4 stream cipher.
An temporary stand in for WEP before a more secure protocol could take over. Used the RC4 stream cipher.
Introduced Temporal Key Integrity Protocol, an 128 encryption key. Turned out to be just as insecure as WEP. Quickly abandoned.
Uses Counter Mode Cipher Block Chaining Message Authentication Code Protocol (CCMP), an AES block cipher, and a 128 bit encryption key. Currently the standard for WiFi security. The simplest version uses a pre-shared key, but this doesn’t do any user authentication.
Uses Counter mode Cipher-Block-Chaining Message-Authentication-Code Protocol (CCMP), an AES based cipher.
Uses the same authentication protocols as WPA, but also introduces a RADIUS server to manage multiple access points.
Notes on Computers
AWS · Bash · C · C++ · Cyber Security · Git · LaTeX · Linux · Networking · Python · Raspberry Pi · Tools · Vim
Notes on Math & Physics
Information Theory · Linear Algebra · Solid State Physics
Copyright 2021 · Eric D. Weise