Upload
alex-dinu
View
217
Download
0
Embed Size (px)
Citation preview
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
1/118
ProCurve Wireless
Fundamentals GuideTechnical Training Version 8.21
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
2/118
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
3/118
Rev. 8.21 i
Contents
Module 1: Wireless Network Technologies and Specifications
Objectives..............................................................................................................1-1
Discussion Topics..................................................................................................1-2
802.11 Standard ............................................................................................1-3Overall Spectrum ..........................................................................................1-4
802.11bFirst Widely Adopted Standard....................................................1-5
802.11aAdding Speed ...............................................................................1-6802.11gAdding Speed and Compatibility.................................................1-8
Approximate Spectral Placement of 802.11b/g Channels.............................1-9
Channel Boundaries ....................................................................................1-10Summary of 802.11a, b, and g Transmission Rates....................................1-11
Basic Rates..........................................................................................1-11Supported Rates..................................................................................1-12
Slot Time ............................................................................................1-12Protection............................................................................................1-12
Modulation for 802.11b, 802.11a, and 802.11g..........................................1-13
802.11b ...............................................................................................1-13802.11a................................................................................................1-14
802.11g ...............................................................................................1-14
802.11 Frame Types....................................................................................1-15Frame Types and Subtypes .........................................................................1-17
Management Frames...........................................................................1-17
Control Frames ...................................................................................1-17Data Frames........................................................................................1-17802.11hMeeting Regulations ..................................................................1-18
802.11hDFS ............................................................................................1-19
Soliciting Reports ...............................................................................1-19Changing Channels.............................................................................1-19
802.11hTPC ............................................................................................1-20
802.11nThe Next-Generation Wireless Standard ...................................1-21802.11nMIMO ........................................................................................1-22
802.11nFurther Advancements ...............................................................1-24
802.11nSummary of Improvements........................................................1-25802.11nBeyond Draft 2.0........................................................................1-26
Other 802.11 Standards...............................................................................1-27
Discussion Topics................................................................................................1-28
Ad-Hoc Mode .............................................................................................1-29Infrastructure Mode.....................................................................................1-30
In-Cell Relay Mode.....................................................................................1-31
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
4/118
ProCurve Wireless Fundamentals
ii Rev. 8.21
Discussion Topics................................................................................................1-32BSS and BSSID ..........................................................................................1-33
ESS and SSID .............................................................................................1-34
WLAN.........................................................................................................1-35
Multiple BSSIDs and WLANs....................................................................1-37
Open Versus Closed Systems .....................................................................1-38Stitching It All Together .............................................................................1-40
Assigning Wireless Traffic to VLANs on the Wired Network...................1-42Discussion Topics................................................................................................1-43
Scanning and Beaconing.............................................................................1-44
Active Scanning..................................................................................1-44Passive Scanning ................................................................................1-45
Preparing to Connect ..........................................................................1-45
Getting Connected...............................................................................................1-46802.11 Authentication.........................................................................1-46
802.11 Association .............................................................................1-46
Supplemental Authentication..............................................................1-47Open-System Authentication...................................................................1-48Shared-Key Authentication.........................................................................1-49
Association..................................................................................................1-51
Supplemental Authentication......................................................................1-52Summary..............................................................................................................1-54
Module 2: Introduction to Radio Technologies
Objectives..............................................................................................................2-1
Discussion Topics..................................................................................................2-2
Radio Waves..........................................................................................................2-3Radio Wave Frequency.................................................................................2-4
Signal Propagation.................................................................................................2-6ObstructionsCauses of Signal Loss ...................................................................2-7Types of Signal Loss ............................................................................................. 2-9
Shadowing ............................................................................................2-9Multipath...............................................................................................2-9
Dropout...............................................................................................2-10
Phase Shift and Signal Strength ..................................................................2-11Overcoming Poor Reception.......................................................................2-12
Measuring Wireless Power..................................................................................2-13
Discussion Topics................................................................................................2-14
Calculating Effective Isotropic Radiated Power (EIRP).....................................2-15
Adjusting EIRP Affects Coverage ..............................................................2-17Cabling Cautions.........................................................................................2-18
Calculating Path Loss..........................................................................................2-19Real-World Path Loss .................................................................................2-21
Scattering Exponent............................................................................2-21
Major Obstructions in the Signal Path................................................2-22Antenna Type......................................................................................2-22
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
5/118
Contents
Rev. 8.21 ii i
Calculating Received Signal Level (RSL) and Range ........................................2-23System Gain and Fade Margin ............................................................................2-25
System Gain........................................................................................2-25
Fade Margin........................................................................................2-26
Formulas Relating EIRP, Range, and Coverage Area.........................................2-27
Free Space...........................................................................................2-27Real-World Environments ..................................................................2-28
Discussion Topics................................................................................................2-30Data Rate Sets......................................................................................................2-31
Operating Modes.........................................................................................2-32
Mixed 802.11b/g Mode ......................................................................2-33802.11b Only ......................................................................................2-33
802.11g Only ......................................................................................2-33
802.11 Pure g Only.............................................................................2-33802.11a................................................................................................2-33
Other Factors Governing Capacity......................................................................2-34
Modulation Technology......................................................................2-34Device Capabilities.............................................................................2-34Limited Media and 802.11 Standards.................................................2-35
Interference.........................................................................................2-35
Discussion Topics................................................................................................2-36Basic Antenna TypesOmnidirectional and Directional...................................2-37
Antenna Basics ...................................................................................2-37
Omnidirectional Antennas..................................................................2-38Directional Antennas ..........................................................................2-38
ProCurve Omnidirectional Antennas..........................................................2-39
ProCurve Directional Antennas ..................................................................2-40
Diversity Antenna .......................................................................................2-41ProCurve Diversity Antenna.......................................................................2-42
Yagi Antenna ..............................................................................................2-43
ProCurve Yagi Antenna ..............................................................................2-44Summary of ProCurve Antennas ................................................................2-45
Summary of Regions Permitting ProCurve External Antennas..................2-46
Summary of ProCurve External Antenna Mounting Options.....................2-47Connector and Cable Types ........................................................................2-48
Connectors ..........................................................................................2-48
Cable...................................................................................................2-49
Terminator ..........................................................................................2-49Installing an External AntennaMounting the Antenna............................2-50
1. Plan the Installation ........................................................................2-50
2. Mount the Antenna .........................................................................2-51Installing an External AntennaConnecting It to an AP or RP.................2-52
3. Connect the Antenna to the AP or RP ............................................ 2-52
4. Configure the AP or RP Radio .......................................................2-53Summary..............................................................................................................2-54
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
6/118
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
7/118
Rev. 8.21 1
ProCurve Wireless Fundamentals
IntroductionThis fundamentals guide is designed to help network engineers and network
professionals understand the foundational technologies and standards for all
wireless networks and the way they interact to enable communications overwireless media. You must understand these technologies and standards before you
attend the ProCurve Mobility Certification Training Course, which provides
hands-on training for the following ProCurve Networking Mobility InfrastructureSolutions:
ProCurve Access Point (AP) 420
ProCurve AP 530
ProCurve Wireless LAN System, which includes the following components:
ProCurve Wireless Edge Services Module
ProCurve Redundant Wireless Services Module
ProCurve Radio Ports (RPs)
Wireless services-enabled switch (such as the ProCurve Switch 5400zl
Series, ProCurve 8212zl Switch, or ProCurve Switch 5300xl Series)
Objectives
This fundamentals guide includes two modules: Module 1: Wireless Network Technologies and Specifications
Module 2: Introduction to Radio Technologies
After completing these two modules, you should be able to:
List the main features, advantages, and disadvantages of the 802.11a, b, and g
standards
Describe the format and roles of the three 802.11 frame types
Discuss the impetus behind and features of the 802.11n standard
Define the three different modes in which wireless networks can operate:
Ad hoc
Infrastructure
In-cell relay (or wireless bridge)
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
8/118
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
9/118
Rev. 8.21 1 1
Wireless Network Technologies andSpecifications
Module 1
Objectives
This module describes the 802.11 standards and other specifications that govern
todays wireless networks. After completing this module, you should be able to:
List the main features, advantages, and disadvantages of the 802.11a, b, and gstandards
Describe the format and roles of the three 802.11 frame types
Discuss the impetus behind and features of the 802.11n standard
Define the three different modes in which wireless networks can operate:
Ad hoc
Infrastructure
In-cell relay (or wireless bridge)
Differentiate between the following wireless networking terms:
Basic service set identifier (BSSID)
Wireless local area network (WLAN)
Service set identifier (SSID)
Explain the difference between an open system and a closed system
Explain how a station connects to an access point (AP), including associating
and authenticating
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
10/118
ProCurve Wireless Fundamentals
1 2 Rev. 8.21
Discussion Topics
Rev. 8.21 3
Discussion Topics
Introduction to 802.11 standards
802.11b
802.11a
802.11g
802.11h
802.11n
Wireless network operating modes
Understanding wireless networks
Getting connected
Fundamentals Guide: 12
To ensure compatibility of hardware and software across vendors and platforms,
companies should select products that support industry guidelines for wireless
networks. Developed by the Institute of Electrical and Electronics Engineers, Inc.
(IEEE), these guidelines are collectively called 802.11 standards, or simply802.11. In everyday use and in this module, 802.11refers to the entire set of
wireless standards or specific subsets indicated by letters after the 11.
This section provides a brief overview of the 802.11 standards of todays wirelessnetworksin particular, 802.11b, 802.11a, and 802.11g. It also explains how
802.11h has brought 802.11a in line with regulations in regions such as Europe.
And finally, it discusses the emerging wireless standard, 802.11n, which may oneday become the predominant standard on enterprise LANs.
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
11/118
Wireless Network Technologies and Specifications
Rev. 8.21 1 3
802.11 Standard
Rev. 8.21 4
802.11 Standard
Original 802.11 standard
Part of the 802 standards for LANs; adapts 802 standard forwireless LANs
Released in 1997
Provides guidelines for the Physical and Data Link layers
Advertised rate of 2 Mbps
2.4 GHz ISM band
802.11a, b, and g amendments
802.11a, b, and g change modulation to increase speed
802.11a changes frequency to decrease interference
Fundamentals Guide: 13
The IEEE published the original 802.11 standard in 1997. An addition to the 802
family of standards, which define the functions of wired LANs, 802.11 defined the
Physical and Data Link layers of wireless networks. In other words, the original
802.11 standard adapted the well-understood LAN standards and technologies fora LAN that uses radio waves as its physical medium.
The original 802.11 standard specified radio frequencies in the unregulated
Industrial Scientific and Medical (ISM) band at 2.4 GHz. Its modulation technique
allowed data transmission rates of 2 Mbpsslow even by 1997 standards when
network users were accustomed to Ethernet speeds of 10 Mbps and more.
The 802.11 working group issued important revisions to the original standard,including 802.11b, 802.11a, and 802.11g. In these revisions, the working group
maintained its original focus on the Physical and Data Link Layers. The
802.11b, a, and g revisions made changes to radio modulation and demodulationtechniques to increase data speeds. And 802.11a added the capability to operate in
the 5 GHz band to avoid interference encountered in the comparatively crowded
2.4 GHz band.
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
12/118
ProCurve Wireless Fundamentals
1 4 Rev. 8.21
Overall Spectrum
Rev. 8.21 5
Overall Spectrum
VLF LF MF HF UHF SHFVHF EHF Infrared Vi sibl e UV GammaX Cosmic
AM radio550 - 1700kHz
FM radio 88-108 MHzVHF TV 54-220 MHz
UHF TV460-600MHz
Remote controls100GHz-500THz
Light700THz - 1000THz
Medical X-ray
Indoor wireless 2.4 GHz, and 5 GHz
Cellular 800-900 MHzPCS 1.8-2 GHz
Cordless phones 900 MHz, 2.4 GHz, and 5 GHzTerrestrial microwave 118 GHz
Super high frequency
Fundamentals Guide: 14
The chart above illustrates the spectrum of electromagnetic waves, pointing out the
frequency bands in which familiar devices operate. The band names are shown in
the middle stripe. More important than memorizing the names, however, is
understanding the place of wireless networks within the spectrum.Wireless networking devices, including the ProCurve Mobility Infrastructure
products, generally operate in the super high frequency (SHF) band. The diagram
illustrates other items that occupy this band, such as microwaves and cordless
phones.
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
13/118
Wireless Network Technologies and Specifications
Rev. 8.21 1 5
802.11bFirst Widely Adopted Standard
Rev. 8.21 6
802.11bFirst Widely AdoptedStandard
Transmission speeds of up to 11 Mbps
2.4 GHz range
Widely adopted standardmost public hotspots operate on thisstandard
Inexpensive equipment
AP2.4 GHz
802.11b111 Mbps
Fundamentals Guide: 15
The IEEEs 1999 revision to the 802.11 standard, 802.11b, operates in the 2.4 GHz
range and advertises transmission speeds of up to 11 Mbps.
Many vendors produced APs and wireless network interface cards (NICs) based on
the new standard. The products were then and have remained inexpensive; as aresult, many wireless networks use 802.11b equipment. Traditionally, this is the
standard used in most home-based wireless networks and public hotspots.
802.11b equipment operates in the 2.4 GHz range, which does not require special
licensingone reason this equipment is relatively cheap. However, 802.11bnetworks may incur interference from microwave ovens, some cordless phones,
and some wireless phones, which operate in the same band.
Note
Advertised rates are the maximum theoretical speeds at which devices
operating on a standard can transmit; the figure relates to radio technology,not actual throughput. For various reasons, actual rates experienced by an end
user will be significantly lower than advertised rates, and can vary widely
even within a session.
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
14/118
ProCurve Wireless Fundamentals
1 6 Rev. 8.21
802.11aAdding Speed
Rev. 8.21 7
802.11aAdding Speed
Transmission speeds of up to 54 Mbps
5 GHz rangelower interference, but higher cost
More channels than 802.11b
Less widely adopted; not compatiblewith 802.11b
AP
5 GHz
654 Mbps
Fundamentals Guide: 16
The next revision to the base standard was 802.11a. Although 802.11a was
proposed first, 802.11b came to the market firsthence the order in which they
appear in this module and the wider prevalence of 802.11b.
802.11a increases the slow rates offered by 802.11b, achieving advertised speedsof up to 54 Mbps. 802.11a radios operate in the 5 GHz band. Because this band is
less crowded than the 2.4 GHz band, 802.11a-compliant wireless products
encounter less interference from other electronic devices. However, some radar,
HiperLAN devices, and wireless phones use the 5 GHz band. The generally lesscrowded band comes at a cost: the 5 GHz band is regulated, so 802.11a devices
tend to be more expensive.
Due to the nature of radio communication, the faster possible rates of 802.11a
come at the cost of range. Devices operating on this standard must be 25 to 50percent closer together than 802.11b devices to achieve their maximum speeds,
making 802.11a a more practical option when high throughput is more importantthan wide coverage.
802.11a radios also have a larger range of channels on which to operate, allowingyou to create more overlap between APs.
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
15/118
Wireless Network Technologies and Specifications
Rev. 8.21 1 7
One drawback for 802.11a is its incompatibility with 802.11b devices, which havebeen widely adopted by both home and business users. Because of the earlier
popularity of 802.11b, these users are often reluctant to reinvest in the new
hardware required to take advantage of the greater speed offered by 802.11a-
compliant devices. Nevertheless, 802.11a devices remain a choice for companies
that decide increased throughput and decreased interference is worth theinvestment.
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
16/118
ProCurve Wireless Fundamentals
1 8 Rev. 8.21
802.11gAdding Speed and Compatibility
Rev. 8.21 8
802.11gAdding Speed andCompatibility
2.4 GHz range
Transmission speeds of up to 54 Mbps
Backward compatible with 802.11b
Incompatible with 802.11a
AP2.4 GHz
802.11b111 Mbps
802.11g654 Mbps
Fundamentals Guide: 18
802.11g matches the higher speed of 802.11a but is compatible with legacy
802.11b equipment. That is, APs or radio ports (RPs) operating at 802.11g speeds
can transparently adapt to 802.11b stations in their coverage area and provide
access at 802.11b speeds. However, when 802.11g APs detect 802.11b stations orAPs in the vicinity, they adapt by increasing the slot time and decreasing the
transmission speeds for frame preambles as well as multicast and broadcast traffic.
Therefore, 802.11g stations in the coverage area will not operate at speeds thatusers may expect.
To guarantee higher throughput for 802.11g stations, you can configure 802.11g
devices to ignore legacy equipment in the vicinity.
802.11g-compliant radios operate in the 2.4 GHz band and advertise rates of up to
54 Mbps. Using the 2.4 GHz range, 802.11g offers a larger range than 802.11a,although stations must be closer to the AP to take advantage of the higher speeds.
802.11g devices are not compatible with 802.11a. Because 802.11g devicesoperate on a different frequency, they do not cause interference with 802.11adevices.
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
17/118
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
18/118
ProCurve Wireless Fundamentals
1 10 Rev. 8.21
Channel Boundaries
Rev. 8.21 10
Channel Boundaries
802.11b/g channels
Fundamentals Guide: 110
0dBrTransmit
Spectrum MaskUnfiltered slnx/x
fcfc 22 MHz fc +22 MHz
fc 11 MHz fc +11 MHz
30 dBr
50 dBr
802.11a channels
TransmitSpectrum
Mask
Unfilteredslnx/x
fcfc 20 MHz fc +20 MHz
fc 10 MHz fc +10 MHz
The 802.11b and 802.11g standards dictate that, at 11 MHz above and below any
one of the center frequencies in the 2.4 GHz band, the signal should be one-
thousandth the strength (30 dB lower) of the signal at the center frequency.
Similarly, while the 802.11a channel boundaries lie 20 MHz above and below thecenter frequency, the signal is significant only over a 20 MHz range around the
center frequency.
As with the 802.11b and 802.11g standards, the 802.11a allowed channels vary
depending on regulatory domain. For the 802.11a, b, and g standards, the FederalCommunications Commission (FCC) regulates wireless networks in the United
States, and in Europe the European Telecommunications Standards Institute
(ETSI) defines allowed sets of channels. Local regulatory bodies adopt one ofthese sets and may add some local exceptions or restrictions.
802.11a channels are spaced every 20 MHz because the 802.11a standard only
defines channels with numbers four apart. For example, the center frequency ofchannel 36 (5.18 GHz, derived by multiplying the channel number by 5 MHz andadding the result to the starting frequency for that channels class) is 20 MHz
below the center frequency of channel 40 (5.20 GHz). Therefore, 802.11a channels
do not interfere with each other in the way that 802.11b channels do.
An exception is that Japan does permit several more closely spaced channels.
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
19/118
Wireless Network Technologies and Specifications
Rev. 8.21 1 11
Summary of 802.11a, b, and g Transmission Rates
Rev. 8.21 11
Summary of 802.11a, b, and gTransmission Rates
6, 12, 24(default)
6, 12, 24(default)
1, 2 (default),5.5, 11
1 (default), 2
6, 12, 24(default)
Basic Rates(Mbps)
Not applicable9 s6, 9, 12, 18, 24,36, 48, 54
802.11a
9 s
9 s
9 or 20 s(dynamic)
20 s
Slot Time
Disabled6, 9, 12, 18, 24,36, 48, 54
802.11g, pureg (not Wi-Fistandard)
Enabled1, 2, 5.5, 11, 6,9, 12, 18, 24, 36,
48, 54
802.11g, gonly (Wi-Fi
standard)
Enabled
Not applicable
Protection for802.11b
1, 2, 5.5, 11, 6,9, 12, 18, 24, 36,48, 54
1, 2, 5.5, 11
Supported Rates(Mbps)
802.11b/gmixed mode(Wi-Fistandard)
802.11b only
Standard
Fundamentals Guide: 111
The slide summarizes the different transmission rates supported by the 802.11a/b/g
standards.
Basic RatesAPs advertise support for one or more basic rates, which they use for:
Management frames
Broadcast frames
Multicast frames
To associate with the AP, stations must support all of these rates. (The process of
associating with an AP is discussed later in this module.) Therefore, an APoperating in 802.11b/g mixed mode advertises the lower rates of 802.11b. In
mixed mode, an AP supports both 802.11b and 802.11g stations.
An AP operating in 802.11g only or pure g mode advertises only the higher rates,so only 802.11g stations can associate with it. In 802.11g only mode, APs do notsupport 802.11b stations in the service area, but they protect against interference
from such stations. In pure g mode, APs ignore all 802.11 b stations, but they do
not provide any protection against interference from 802.11b stations. You shoulduse pure g mode only if you are certain no 802.11b stations are operating in range
of the AP.
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
20/118
ProCurve Wireless Fundamentals
1 12 Rev. 8.21
Supported Rates
Supported rates are those that an AP will accept for stations unicast traffic.Various stations in the same basic service set (BSS) may use different rates; in
fact, a station may change rates throughout its association, depending on the
current signal-to-noise ratio (SNR).
Although Wi-Fis 802.11g only mode does not allow 802.11b stations to associate,its supported rates include 802.11b rates to protect against interference from
802.11b stations in the area. 802.11 pure-g, which is nota Wi-Fi standard, does not
permit any of the 802.11b rates.
Slot Time
The slot time dictates how long a station waits between detecting a transmission
and attempting to transmit a frame. (It is one of the parameters associated with the
Carrier Sense Multiple Access with Collision Avoidance [CSMA/CA] mechanism
necessary on half-duplex shared media.)
802.11a and 802.11g have higher rates, transmit frames more quickly, and useshorter slot times. In the presence of 802.11b devices, however, 802.11g devices
must use the longer slot time; otherwise, the 802.11g devices will not wait long
enough after detecting contention, and frames may collide.
Protection
Although 802.11b stations cannot detect transmissions that use 802.11gmodulation, 802.11b and 802.11g transmissions interfere with each other. 802.11b
stations, which are deaf to their 802.11g neighbors, can cause collisions. Protection
requires 802.11g stations to alert 802.11b stations to their transmissions by using802.11b modulation for the preamble. The 802.11b may also be required to clear
the medium by sending a clear to send (CTS) frame with a modulation that802.11b stations can detectin other words, at a lower 802.11b, rather than
802.11g, speed.
A primary difference between 802.11g only and 802.11 pure g mode is that 802.11
pure g disables protection, reducing overhead and increasing throughput.
However, even if your AP does not allow 802.11b stations to actually associate,
such stations can cause collisions by sending probe requests. (Stations use proberequests to locate an AP, as will be explained later in this module.) Therefore,
protection is required not only when 802.11b stations might connect to your
WLAN, but also if they might enter your APs coverage areaanother reason touse 802.11 pure g only in environments without any 802.11b stations at all.
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
21/118
Wireless Network Technologies and Specifications
Rev. 8.21 1 13
Modulation for 802.11b, 802.11a, and 802.11g
Rev. 8.21 12
Modulation for 802.11b,802.11a, and 802.11g
802.11b
Direct-Sequence Spread Spectrum (DSSS)
Binary and Quaternary Differential Phase Shift Keying (DPSK)1 and2 Mbps
Complementary Code Keying (CCK)5.5 and 11 Mbps
802.11a
Orthogonal Frequency-Division Multiplexing (OFDM)
DPBSK6 Mbps
DPQSK12 Mbps
Quadrature Amplitude Modulation (QAM)-1624 and 36 Mbps
QAM-6448 and 54 Mbps
802.11g OFDM similar to 802.11a54, 48, 36, 24, 18, 12, and 6 Mbps
DSSS for backward-compatibility with 802.11b
Fundamentals Guide: 113
As part of a Physical Layer standard, a modulation technique specifies how a
device encodes data into the signal. 802.11 standards use four types of modulation.
Describing modulation in detail is beyond the scope of this fundamentals guide;
however, you should understand that the different standards use differentmodulation and that these differences translate to different data sets and receiver
sensitivities.
802.11b
802.11b uses Direct-Sequence Spread Spectrum (DSSS). DSSS modifies the data
stream with a pseudorandom stream of chips, spreading the signal out across thefrequency and also increasing the amount of transmitted data.
For the lower data rates, 802.11b modulates data using DSSS and the original
802.11s Differential Phase Shift Keying (DPSK).
DPSK actually encodes the data into the radio signal. It shifts the radio wavesphase a certain amount depending on the value of the data bits being transmitted.DPSK comes in two varieties:
Binary DPSK (DPBSK) defines only two phase shiftsone for 0 and one
for 1which are separated by 180o. This type is used for the 1 Mbps data
rate.
Quaternary DPSK (DQPSK) defines four phase shifts, one for 00, one for 01,one for 10, and one for 11which are separated by 90
o. This type is used for
the 2 Mbps data rate.
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
22/118
ProCurve Wireless Fundamentals
1 14 Rev. 8.21
The larger separation between phase shifts for DBPSK means that a receiver candetect the shift more easily. This is why the receiver sensitivity can be quite low
for a 1 Mbps connection.
802.11b also enhances 802.11s speeds by adding a new modulation technique:
Complementary Code Keying (CCK).
With CCK, the chips that DSSS uses to modulate the stream are 8-bitcomplementary codes. The exact code depends on a symbol, which in turn
depends on data to be transmitted. The 11 Mbps data rate defines symbols that
include 8 bits of data, while the 5.5 Mbps data rate symbols only include 4 bits ofdata. For example, 11010101 translates to a specific symbol for 11 Mbps CCK.
802.11a
802.11a uses Orthogonal Frequency-Division Multiplexing (OFDM) instead ofDSSS. OFDM divides a channel into a number of subchannels. Each subchannel
transmits a separate data stream, increasing the total amount of data transmitted.
Like 802.11b, 802.11a can use DPSK to encode data. However, the OFDM datarate is increased six-fold to 6 and 12 Mbps from DSSSs 1 and 2 Mbps.
802.11a also supports Quadrature Amplitude Modulation (QAM), which encodes
more data into the radio wave by combining multiple waves.
Note again that the modulation techniques that enable the higher data rates also
require receivers to detect more subtle shifts in the radio wave. Thus the receiversensitivity must be greater, and the receiver cannot use a signal as low as the signal
it could use at a lower data rate.
802.11g
802.11g specifies OFDM for the higher data rates, but also requires support forDSSS to provide backward compatibility with 802.11b.
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
23/118
Wireless Network Technologies and Specifications
Rev. 8.21 1 15
802.11 Frame Types
Rev. 8.21 13
802.11 Frame Types
The fundamental frame types and their formats have remainedthe same through all 802.11 revisions:
Management frames
Control frames
Data frames
Field names and length in bytes
MAC Header
Fundamentals Guide: 115
2
FrameControl
0-2312
Framebody
6
Address 4
2
SequenceControl
46662
FCSAddress 3Address 2Address 1Duration/ID
The foundational Data Link Layer specifications of 802.11 have remained the
same throughout the revisions. These specifications include:
Frame types and formats
MAC mechanisms
Every frame transmitted on a wireless network must conform to 802.11 standards
for structure and format, regardless of the operational mode of the radio (802.11a,b, or g). The general structure of a wireless frame is shown in the slide.
802.11 defines three types of frames, each with its own functions and subtypes.
The three main types, described in more detail on the next slide, are management
frames, control frames, and data frames. A frames type is identified in the framecontrol field of the 802.11 frames Media Access Control (MAC) header.
Besides the frame type, the MAC header also contains address and media access
control information. The slide illustrates the fields for a MAC header. Not everyframe type transmitted will include all of the listed fields; for example, someframes types need include only the frame control field and the first address field.
When a frame comes from the wired network destined to a wireless station, the AP
processes the frame by removing the Ethernet header and adding the 802.11
header. It then forwards the frame toward the correct destination station, which itknows by MAC address and association ID.
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
24/118
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
25/118
Wireless Network Technologies and Specifications
Rev. 8.21 1 17
Frame Types and Subtypes
Rev. 8.21 14
Frame Types and Subtypes
User data;payload fromhigher level
protocols
Data Frames
Request to Send (RTS)
Clear to Send (CTS)
Acknowledgement (ACK)
Power-Save Poll (PS-Poll)
Control Frames
Beacon
Probe Request
Probe Response
IBSS announcement trafficindication map (ATIM)
Disassociation
Deauthentication
Authentication
Association
Reassociation
Association Response
Reassociation ResponseAction
Management Frames
Fundamentals Guide: 117
The slide lists various subtypes of frames under the three main 802.11 types.
Management Frames
Management frames establish and regulate the Data Link Layer connectionbetween APs and wireless stations. APs and stations are allowed to transmit
different types of management frames. For example, an AP can send beacons to
advertise a wireless network. A station can send an association request, and an APcan send an association response, allowing the station to connect to it.
Control Frames
Control frames regulate access to the Physical Layer transmission medium.
Request to Send and Clear to Send (CTS) frames reserve the medium for atransmission. Transmitting a frame across a wireless network can be uncertain;
acknowledgements (ACKs) let a wireless device know that its frame reached its
destination successfully.
Data Frames
Data frames contain higher-layer protocols such as specific applications and
TCP/IP functions. Transmitting data is of course the ultimate goal of a wirelessnetwork.
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
26/118
ProCurve Wireless Fundamentals
1 18 Rev. 8.21
802.11hMeeting Regulations
Rev. 8.21 15
802.11hMeeting Regulations
Designed to provide regulatory compliance for 802.11a
Required in Europe
Defined two mechanisms for complying with regulations andimproving quality:
Dynamic frequency selection (DFS)
Transmit power control (TPC)
Fundamentals Guide: 118
Another reason many vendors failed to adopt 802.11a, despite initial advantages of
higher speed and lower interference, was the difficulty of meeting varying
regulations, particularly in Europe. For example, the military often uses the 5 GHz
band, and governments obviously object to private parties interfering with theirradar.
802.11h defines two mechanisms for meeting regulations: DFS and TPC. Both
mechanisms help an AP adapt to changing circumstances, such as significant
interference. Besides ensuring that your wireless network meets all regulations,these mechanisms provide the added benefit of better management for the radio
medium.
Note
As of July 2007, the United States Federal Communications Commission
(FCC) requires DFS.
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
27/118
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
28/118
ProCurve Wireless Fundamentals
1 20 Rev. 8.21
802.11hTPC
Rev. 8.21 17
802.11hTPC
TPC minimizes interference with satellites and manages power.
The AP solicits reports on:
Maximum and minimum transmit powers for each station
Current signal strength
The AP enforces a maximum transmit power.
Stations can raise power up to the maximum if the link margin fallstoo low.
Fundamentals Guide: 120
TPC minimizes a wireless networks interference with satellite communications by
allowing you to configure a maximum transmit power for your network. This
maximum is regulated by the AP, which not only complies with the limit, but also
forces stations to transmit at or below this maximum.In addition to enforcing regulatory compliance, TPC helps conserve power, a
useful feature for stations with a limited battery power. The AP monitors the
network to ensure that power usage remains just over the level to maintain
adequate signal strength. If the current signal strength falls below the fade margin(a signal strength slightly above that at which the signal is lost), stations can raise
their power as far as necessary up to the allowed maximum.
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
29/118
Wireless Network Technologies and Specifications
Rev. 8.21 1 21
802.11nThe Next-Generation Wireless Standard
Rev. 8.21 18
802.11nThe Next-GenerationWireless Standard
Next-generation wireless applications necessitate improved WLANdata throughput capabilities.
802.11n is designed to
Increase network speed and reliability
Extend the operating distance of wireless networks
802.11n may eventually become the dominant enterprise LANtechnology.
It specifies either the 2.4 GHz or 5 GHz frequency bands.
Provides backward compatibility for 802.11b/g/a devices
Fundamentals Guide: 121
As next-generation wireless applications emerge, improved WLAN data
throughput capabilities are becoming essential. Even now, enterprise-class,
bandwidth-intensive applications such as Enterprise Resource Planning (ERP) and
Customer Relationship Management (CRM) systems, workgroup computingapplications, and some wireless backhaul applications require throughputs larger
than current 802.11 technologies can provide. Videoconferencing is an uncertain
proposition with 802.11g, which while offering a theoretical maximum throughputof 54 Mbps, enables real-world speeds of half that or less.
In response, the IEEE Task Group N (TGn) and the Wi-Fi Alliance (WFA) have
set goals for the next generation of WLAN performance. The emerging IEEE
802.11n standard is intended to increase network speed and reliability as well as toextend the operating distance of wireless networks. Although the standard will
probably not be ratified until early 2009, expectations are that 802.11n will easily
provide up to twice the range of 802.11g; and while the TGns goal is 100 Mbps
net throughput, the final proposal seems certain to offer many times that inmaximum configurations. As such, 802.11n may eventually become the dominant
enterprise LAN technology.
802.11n operates in either the 2.4 GHz or 5 GHz frequency bandsenabling it toprovide backward compatibility for 802.11a/b/g devices.
The purpose of this section is to explain the soon-to-be-released 802.11n standard
and how it will enable WLANs to support emerging media-rich applications.
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
30/118
ProCurve Wireless Fundamentals
1 22 Rev. 8.21
802.11nMIMO
Rev. 8.21 19
802.11nMIMO
Spatial multiplexingsends multiple data streams in the samechannel to multiply data throughput
Signals from each transmitter reach the target receiver via a unique path.
The receivers in MIMO systems consistently process each multipathcomponent.
Fundamentals Guide: 122
The 802.11n standard is the first to call for multiple-input, multiple-output
(MIMO) antenna design. MIMO algorithms in a radio chipset send data out over
two to four antennas. Signals from each transmitter can reach the target receiver
via a unique path, allowing for spatial multiplexingthat is, sending multipledata streams in the same channel to multiply the throughput of a single stream.
MIMO works best if these paths are spatially distinct, resulting in received signals
that are uncorrelated. Thus, while traditional 802.11 networks degrade in the
presence of multipatha propagation phenomenon by which multiple radiosignals reach receiving antennas by bouncing off of objects along the way
multipath helps decorrelate the 802.11n channels, enhancing the operation of
spatial multiplexing. The signals are recombined on the receiving side by theMIMO algorithmsdramatically improving wireless performance and reliability.
Traditionally, when reflections combine, they distort the signal at the receiver. The
two to four receivers in MIMO systems, however, consistently process eachmultipath component, thereby eliminating the mixture of out-of-phase componentsthat would normally result in signal distortion.
Because spatial-multiplexing techniques make receivers much more complex,
designers usually combine them with OFDM modulation schemes, which are more
efficient than other modulation schemes. The 802.11n OFDM implementationimproves upon the one employed in earlier standards, using a higher maximum
code rate and slightly wider bandwidth.
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
31/118
Wireless Network Technologies and Specifications
Rev. 8.21 1 23
Space-time block coding, an 802.11n option, uses multiple antennas forredundancy to increase robustness. Another option is beamforming, which uses
multiple antennas as if they were parts of an array, forming a directional antenna
that directs a beam to increase range. The 802.11n PHY specification allows
beamforming when the number of transmit antennas exceeds the number of spatial
streams, or when the channel between the receiver and transmitter is known wellenough by the transmitter to enable it to send most of the signal energy in
directions that will benefit the receiver.
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
32/118
ProCurve Wireless Fundamentals
1 24 Rev. 8.21
802.11nFurther Advancements
Rev. 8.21 20
802.11nFurther Advancements
Channel bonding: combines two adjacent 20 MHz channels into asingle 40 MHz channel
Bandwidth is more than doubled.
Draft 2.0 recommends that 40 MHz channels be used only in the 5GHzband.
Other capabilities designed to reduce overhead and enhance
throughput include:
Frame aggregation
Block acknowledgements
Reduced inter-frame spacing
Fundamentals Guide: 124
While MIMO represents the most significant architectural advancement in
802.11n, the standard includes additional Physical Layer feature enhancements
designed to boost performance. The most notable improvement is support for 40
MHz radio channels, which have twice the theoretical capacity of existing 802.11radio channels. A technique called channel bonding combines two adjacent 20
MHz channels into a single 40 MHz channel. Bandwidth is more than doubled,
because the guard band between the two 20 MHz channels, used to avoidinterference between these channels, can also be removed when they are bonded.
802.11n can also operate using the standard 20 MHz channels; in fact, draft 2.0 of
the specification recommends that 40 MHz channels be used only in the 5GHz
band. As mentioned earlier, the 2.4 GHz frequency band has only three non-overlapping 20 MHz channels, and therefore, bonding two 20 MHz channels uses
two-thirds of the total frequency capacity.
802.11n also improves upon the standard at the Data Link Layer. New capabilitiesinclude frame aggregation, block acknowledgements, and reduced inter-framespacing, all designed to reduce overhead and enhance throughput.
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
33/118
Wireless Network Technologies and Specifications
Rev. 8.21 1 25
802.11nSummary of Improvements
Rev. 8.21 21
802.11nSummary ofImprovements
144 Mbps with OFDM, 2x2,20-MHz channel width
25 Mbps with OFDMTypical transmitting datarate
600 Mbps with OFDM, 4x4,40-MHz channel width
54 Mbps with OFDMMaximum transmittingdata rate
OFDM; backward compatiblewith CCK and DSSS
OFDM; backwardscompatible with CCKand DSSS
Modulation schemes
Between two and fourOneNo. of transmitting orreceiving spatial streams
20 MHz, 40 MHz20 MHzChannel width
2.4 GHz, 5 GHz
802.11n Draft 2.0(approved March 2007)
2.4 GHz
802.11g
RF band
Feature
Fundamentals Guide: 125
Todays 802.11n-compliant products can typically reach a throughput of 144
Mbps, assuming OFDM modulation, two transmitting and two receiving
streamsknown as a 22 configurationand a 20-MHz channel width. The
currently theoretical maximum throughput rate of 600 Mbps assumes OFDMmodulation, a 44 configuration, and a 40-MHz channel width.
Range is harder to quantify because it's affected by many variables, such as
barriers that could block the signal. However, todays 802.11n equipment based on
draft 2.0 of the specification typically delivers more than twice the range of802.11g equipment, at any given throughput speed.
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
34/118
ProCurve Wireless Fundamentals
1 26 Rev. 8.21
802.11nBeyond Draft 2.0
Rev. 8.21 22
802.11nBeyond Draft 2.0
802.11n is still being refined.
There are an unprecedented number of options.
The mandatory sections are unlikely to change.
Changes would threaten interoperability with existing Draft 2.0 offerings.
May 2007certified for 802.11n Draft 2.0 program
Certification program began in June of that year.
WFA-certified 802.11n Draft 2.0 products should be firmware upgradeableto the final IEEE 802.11n standard.
Fundamentals Guide: 126
As mentioned at the beginning of this section, 802.11n is expected to continue
undergoing refinement until early 2009. The unprecedented number of options
makes this fine tuning particularly necessary. The mandatory sections, however,
are unlikely to change at this point, because such changes might threateninteroperability with the consumer markets many Draft 2.0 product offerings.
In May 2007, after the TGn approved Draft 2.0, the WFA unveiled the Certified
for 802.11n Draft 2.0 program, and announced the first certified chip, card, and
box products, which form the test bed for certifying additional products. Theformal certification program began in June 2007. It is believed that WFA-certified
802.11n Draft 2.0 products will be firmware upgradeable to the final IEEE
802.11n standard.
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
35/118
Wireless Network Technologies and Specifications
Rev. 8.21 1 27
Other 802.11 Standards
Rev. 8.21 23
Other 802.11 Standards
Improves Layer 2 roamingUnderdevelopment
802.11r
An emerging standard that will allow the use ofthe 3560-3700 MHz band in the United States
Underdevelopment
802.11y
Makes 802.11a compatible with Japanese radioregulations
Approved802.11j
Improves Layer 2 securityApproved802.11i
Provides quality of service (QoS) for wirelessnetworks
Purpose
Approved
Status
802.11e
Standard
Fundamentals Guide: 127
The IEEE continues to issue revisions and updates to wireless networking
standards. The complete list is longer than the one in the slide, which shows the
802.11 standards you are most likely to encounter as an IT professional. More
information about each standard can be found at the working groups Web site:http://grouper.ieee.org/groups/802/11/
A timeline for the publication and approval of future standards is displayed at:
http://grouper.ieee.org/groups/802/11/Reports/802.11_Timelines.htm
Note
Whats in a letter? The case of the letter following the 11 is not random:
lowercase letters denote a revision to the original standard, while uppercase
letters indicate a standard that can stand on its own.
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
36/118
ProCurve Wireless Fundamentals
1 28 Rev. 8.21
Discussion Topics
Rev. 8.21 24
Discussion Topics
Introduction to 802.11 standards
Wireless network operating modes
Ad hoc
Infrastructure
In-cell relay (bridging)
Understanding wireless networks
Getting connected
Fundamentals Guide: 128
Now that you understand the standards that provide a common foundation for all
wireless networks, you will learn about the three basic types of wireless networks.
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
37/118
Wireless Network Technologies and Specifications
Rev. 8.21 1 29
Ad-Hoc Mode
Rev. 8.21 25
Ad-Hoc Mode
Includes two or more stations Provides peer-to-peer connectivity Also called an independent basic service set (IBSS)
IBSS
Fundamentals Guide: 129
An ad-hoc network includes two or more stations that communicate directly with
each other through wireless transmissions. Each station in an ad-hoc network
receives every packet transmitted; 802.11 specifies the CSMA/CA mechanism to
prevent loss of data due to simultaneous transmissions.Ad-hoc networks are sometimes referred to as IBSSs because they require no
attachment to a wired network. Inexpensive and easy to establish, such networks
are used most often for exchanging files in small meeting areas when access to the
wired network is not necessary or not possible.
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
38/118
ProCurve Wireless Fundamentals
1 30 Rev. 8.21
Infrastructure Mode
Rev. 8.21 26
Infrastructure Mode
One AP and one or more stations All data passes through the AP. The AP connects to a wired network.
Wired network
Fundamentals Guide: 130
Today, infrastructure mode is the most common deployment for wireless
networks. In this mode, stations do not communicate directly with one another.
Instead, an AP handles all communication between wireless stations as well as
controls the security and speed parameters for the network.In addition to connecting wireless stations to each other, the AP is connected to a
wired network. As the interface between the wired and the wireless network, the
AP receives wireless traffic from stations and forwards it on to the wired network.
Likewise, the AP receives and forwards traffic that is being sent from the wirednetwork to the wireless stations.
Rather than using APs in an infrastructure mode, you can use RPs. RPs are APs
coordinated through a device on the wired network. For example, the ProCurve
Wireless Edge Services xl Module can control multiple RPs.
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
39/118
Wireless Network Technologies and Specifications
Rev. 8.21 1 31
In-Cell Relay Mode
Rev. 8.21 27
In-Cell Relay Mode
Also called a wireless bridge or wireless distribution system (WDS) Wireless link connecting two networks
Available only on the ProCurve AP 530 and ProCurve AP 520wl
ConnectedAP 530
Wired LAN inbuilding 1
Stations
Wirelessbridge
betweennetworks Connected
AP 530
Wired LAN inbuilding 2
Stations
Fundamentals Guide: 131
In-cell relay mode is more commonly called bridgingbecause this mode connects
two or more segments of a network. (The segments can be different segments of a
LAN, unconnected wireless networks, or even separate BSSs that are part of the
same broadcast domain.)In-cell relay mode is also called a WDS. In typical infrastructure mode, APs
simply bridge traffic to wireless stations; the wired network provides the
distribution system for transmitting traffic from wireless stations to its ultimate
destination. With WDS, the wireless medium becomes a distribution system aswell, operating as if it were a wired infrastructure.
WDS is available on the AP 530 and AP 520wl.
WDS connections are most often deployed for two broad purposes:
An Ethernet connection is not readily available to connect an AP to the wired
network.
A company wants to connect two wired networks, but pulling cable betweenthe two buildings is not practical or even possible.
The slide demonstrates one such application: IT managers want to connect two
segments of the enterprise network located in different buildings. Because pulling
cable beneath the street is impossible, they opt for a WDS. An AP 530 is attachedto each LAN, and one radio on each is configured to act as a bridge. The other
radio can be disabled or may serve wireless stations.
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
40/118
ProCurve Wireless Fundamentals
1 32 Rev. 8.21
Discussion Topics
Rev. 8.21 28
Discussion Topics
Introduction to 802.11 standards
Wireless network operating modes
Understanding wireless networks
BSS and BSSID
ESS and ESSID
WLANs
Open versus closed systems
Relationship to virtual LANs (VLANs)
Getting connected
Fundamentals Guide: 132
You will now learn how to define a wireless network more precisely.
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
41/118
Wireless Network Technologies and Specifications
Rev. 8.21 1 33
BSS and BSSID
Rev. 8.21 29
BSS and BSSID
BSSAP
Wirednetwork
One AP and its stations compose a BSS.
Each BSS has a 48-bit identifier (usually the APs MAC address)called the BSSID.
The BSSID distinguishes one BSS from another.
Fundamentals Guide: 133
Any one or more stations and their AP compose a BSS. (As mentioned earlier, an
IBSS does not have an AP because the stations connect to each other instead of to
a wired network.)
Each BSS has a unique, 48-bit identifier called the BSSID, which is usually theMAC address of the APs wireless interface (its radio). Every frame transmitted to
and from the stations in a BSS contains the BSSID in the frame header, identifying
the frame as belonging to a particular APs coverage area. Thus the BSSID
distinguishes the BSS from others and increases efficiency by allowing the AP andstations to ignore frames not belonging to their BSS.
The ProCurve AP 420 pictured in the slide supports one BSSIDwhich is the
same as the APs wireless interface MAC address. The AP 530 supports one
BSSID on each radio for each of its 16 WLANs.
When a new station joins a cell, it appends the APs BSSID to all frames as the
receiver address in the 802.11 header.
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
42/118
ProCurve Wireless Fundamentals
1 34 Rev. 8.21
ESS and SSID
Rev. 8.21 30
ESS and SSID
W
irednetwork
AP
AP
AP
BSS 1
BSS 2
BSS 3
ESS
Two or more BSSs compose an extended service set (ESS). Each ESS is identified by an extended service set identifier (ESSID).
The ESSID is commonly called the SSID, or network name.
Fundamentals Guide: 134
Several BSSs, each with their own BSSID specifying the AP, may belong to the
same ESS. That is, even though they may be spatially separate wireless networks,
they behave as if they are the same network.
This slide illustrates several BSSs composing one ESS. For ease of illustration, theBSSs are spatially separated, but they need not be. In actual wireless networks,
some overlap is desirable to enable roaming.
Each ESS has a unique, 48-bit identifier called the ESSID, which functions as the
networks name. Although ESSID is more precise, the industry commonly uses thegeneral term SSID to signify the network name. For example, the command line
interface (CLI) and the graphical user interface (GUI) for most APs use SSID.
Like the BSSID, the SSID is included in the 802.11 header of every frame
transmitted on a wireless network.
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
43/118
Wireless Network Technologies and Specifications
Rev. 8.21 1 35
WLAN
Rev. 8.21 31
WLAN
A WLAN defines settings for an ESS. The SSID identifies the WLAN.
Like VLANs in Ethernet networks, WLANs divide stations intoseparate broadcast domains.
VLANs
VLAN 10 VLAN 20
WLAN 1 WLAN 1
WLAN 2 WLAN 2
SSID:wireless 20
SSID:wireless 20
SSID:wireless 10
SSID:wireless 10
WLANs
Fundamentals Guide: 135
A
B
C
An ESS can also be called a WLAN, which defines various settings for the ESS
such as the SSID and security options.
WLANs on wireless networks can be compared to VLANs on Ethernet networks.
VLANs isolate users into separate broadcast areas. Even though users may connectto the same network devices, they are effectively in different networks. VLANs
are important both for managing user traffic and for maintaining security.
WLANs fill a similar purpose in wireless networks: they divide users into different
groups, steering each user toward the appropriate resources and access levels. Justas VLANs on a switch effectively transform the switch into several virtual
switches, WLANs on an AP effectively divide the AP into several virtual APs,
each providing a separate network connection to a group of mobile users.
Like a VLAN, a WLAN creates a broadcast domainwhich acts like one unifiednetwork regardless of the physical location of the hardware. The slide above shows
two APs that support two WLANs. As far as logical connectivity is concerned, theWLAN to which a station connects is more important than the stations location.For example, station A connects to WLAN 1 through AP 1, station B to WLAN 2
through AP 1, and station C to WLAN 1 through AP 2. Station A and station C are
connecting to the same WLAN. Station A and station B are connecting to differentWLANs, even though they are located side by side.
IT managers can exercise a great deal of control over wireless access through
carefully planned WLAN options.
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
44/118
ProCurve Wireless Fundamentals
1 36 Rev. 8.21
Note
In much of the industry the term WLANis used interchangeably with wireless
network. While this use of WLAN is correct, the term wireless network canalso be used to describe all wireless components of a larger networkall the
APs, wireless stations, and wireless services-enabled switches, which might
together support multiple WLANs. In this module, WLAN describes the
broadcast domain defined by an SSID.
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
45/118
Wireless Network Technologies and Specifications
Rev. 8.21 1 37
Multiple BSSIDs and WLANs
Rev. 8.21 32
Multiple BSSIDs and WLANs
When you create a WLAN, the AP maps it to a BSSID.
A BSSID can carry one or more WLANs.
WLAN 1
WLAN 2SSID:Guests
SSID:Employees
AP 530 Radio 1 MAC address:00:14:aa:aa:aa:20
16 BSSIDs (virtual MACaddresses):
00:14:aa:aa:aa:20
00:14:aa:aa:aa:21..
00:14:aa:aa:aa:2f
Maps WLAN 1to this BSSID
AP 530
AP 420 Radio MAC address:
00:0d:bb:bb:bb:10
Maps WLAN 2to this BSSID
Maps both WLANsto this BSSID
AP 420 WLAN 1
WLAN 2SSID:Guests
SSID:Employees
Fundamentals Guide: 137
As indicated on the previous slide, your companys APs might support multiple
WLANs. Each AP carries traffic for these WLANs within its own BSS. An AP
might carry traffic for several WLANs within the same BSS, or it might provideseparate BSSs for separate WLANs. It all depends on how many BSSIDs the
AP has.
For example, the AP 530 supports up to 16 BSSIDs per radio. It can carry one
WLAN on each BSSID, for a potential total of 16 WLANs enabled on either orboth radios. (That is, even though the AP has 32 total BSSIDs, it supports only 16
WLANs with individual configurable settings. The settings for a WLAN on radio
1 are copied to that WLAN on radio 2.) When you enable a WLAN on a radio, theAP 530 automatically assigns it to the next available of that radios pool of 16
BSSIDs.
The AP 420, on the other hand, has a single BSSID and carries traffic for multiple
WLANs on that single identifier.
The ProCurve RP 210 has four BSSIDs, and the ProCurve RP 220 and ProCurveRP 230 have four BSSIDs per radio. Each BSSID can carry traffic for up to four
WLANs, for a total of 16 WLANs on each RP. (If you use the advanced mode
configuration, the dual-radio RPs 220 and 230 can support up to 32 WLANs.)
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
46/118
ProCurve Wireless Fundamentals
1 38 Rev. 8.21
Open Versus Closed Systems
Rev. 8.21 33
Open Versus Closed Systems
Open systemSSID(s) advertised in beacon frames
Closed systemSSID(s) not advertised
AP
AP
SSID: publicwifi
SSID
:publicwifi
Closed SystemOpen System
Stations thatknow SSID
Station that doesnot know SSID
SSID
:
Fundamentals Guide: 138
In an open system WLAN, such as a public hotspot, APs advertise their SSID
at regular intervals, basically inviting anyone with a wireless device to join
the WLAN.
Many APs operate in open system by default. However, as a modest securityfeature, IT managers can configure APs to operate in closed system mode,
disabling the automatic advertisement of the SSID.
In this case, users must already know the SSID in order to join the WLAN. If an
AP supports only closed system WLANs, stations within range may detect itsradio signal, but their client utilities will not display any available wireless
networks. To join a network, users must manually configure their wireless
configuration utility with the correct SSID.
As a security measure, a closed system will deter only the most casualunauthorized users and should not be considered a reliable protection against
attacks. More determined attackers can use wireless sniffers to detect the SSID,which, even in closed systems, is included in plaintext in the header of every dataframe.
Because the source address of the beacon frame, which is used to advertise the
SSID, is a BSSID, the number of SSIDs an AP can advertise depends on how it
implements BSSIDs. For example, the AP 420 supports only one BSSID, whichcan be mapped to multiple WLANs. As a result, the AP 420 can advertise only the
SSID for the primary WLAN. You can configure the primary WLAN to operate in
open or closed system mode, but all others must operate in closed system mode.
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
47/118
Wireless Network Technologies and Specifications
Rev. 8.21 1 39
The RPs adopted by the Wireless Module can operate up to four SSIDs in opensystem mode (eight with advanced configuration on dual-radio RPs).
By contrast, the AP 530 can advertise all of its SSIDs because each one is carried
on a separate BSSID. Thus, for each WLAN, you can choose either open or closed
system mode.
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
48/118
ProCurve Wireless Fundamentals
1 40 Rev. 8.21
Stitching It All Together
Rev. 8.21 34
Stitching It All Together
Wired network
BSSID:1713
BSSID:
1712
BSSID:1711
Wireless services-enabled switch
SSID:guest
WLAN 1WLAN 2
WLAN 3
SSID:private
SSID:mywireless
WLAN 1
WLAN 2
WLAN 3
WLAN 1
Fundamentals Guide: 140
Enterprise wireless networks can comprise many smaller WLANs, each identified
by a unique SSID. Those WLANs, in turn, might include several APs, each with
its own BSSID for that WLAN.
This slide illustrates a simple network made up of two RPs, which support thesame three WLANs named guest, private, and mywireless. The WLANs do
not interfere with one another because the SSIDs separate traffic into broadcast
domains. (That is to say, the WLANs are logically separateactual transmissionsmay potentially interfere with each other because the collision domain is defined
by the radio, not the WLAN.) The RP in the foreground maps separate SSIDs to
separate BSSIDs, but this is not mandatory. All three SSIDs could in fact beassigned to just one BSSID.
When a user enters the RPs coverage area, his wireless client displays two
available wireless connections: mywireless and guest. (Because WLAN 2 is
designed for employee use only, it operates in closed system mode, and its SSID,
private, is not advertised.) The user would then choose an SSID and associatewith an RP beaconing that SSID.
The WLAN determines settings for the connection. For example, all stations in the
mywireless network authenticate in the same way, use the same securitysettings, and receive the same broadcasts. Once associated, a station can roam
from RP to RP and maintain its connection to the WLAN, probably without the
user even noticing the change.
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
49/118
Wireless Network Technologies and Specifications
Rev. 8.21 1 41
Each time a station transmits a wireless frame, the station includes its current RPsBSSID and the WLANs SSID in the frames header. The RP receives the frame
and forwards it to the wired network accordingly, as described on the next slide.
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
50/118
ProCurve Wireless Fundamentals
1 42 Rev. 8.21
Assigning Wireless Traffic to VLANs on the Wired Network
Rev. 8.21 35
Assigning Wireless Traffic to VLANson the Wired Network
On the wired side, the AP assigns a WLANs incoming traffic:
To the specified VLAN
To the user-based VLAN (overrides WLAN setting)
WLAN 2
WLAN 1
SSID:Employees
SSID:Guest
APSwitch
VLAN 10
WLAN 1 frame
Fundamentals Guide: 142
As discussed earlier, an AP (or the Wireless Module) is the interface between the
wireless and the Ethernet network. When a mobile station needs to send traffic to a
device in the Ethernet network, it sends the traffic to its AP, which forwards the
traffic on the stations behalf.An important part of the APs role, therefore, is determining the VLAN in which
to forward incoming wireless traffic. ProCurve wireless products can make this
decision based on:
WLAN, by forwarding all traffic from a particular WLAN in the VLAN youchoose
The VLAN associated with the WLAN is somewhat like a ProCurve switchs
authorized VLAN. Any user allowed to connect to the WLAN is placed in
that VLANunless you have configured a user-based, or dynamic, VLAN.
User, by assigning a users traffic to a particular VLAN
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
51/118
Wireless Network Technologies and Specifications
Rev. 8.21 1 43
Discussion Topics
Rev. 8.21 36
Discussion Topics
Introduction to 802.11 standards
Wireless network operating modes
Understanding wireless networks
Getting connected
Scanning and beaconing
802.11 authentication
Association
Supplemental authentication
Fundamentals Guide: 143
When you attempt to connect to a wireless network, a number of steps, usually
transparent to you, must occur before you can begin using the wireless link. This
section describes these stepswhich are the same whether you are connecting to
an AP or to an RP controlled by the Wireless Module.
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
52/118
ProCurve Wireless Fundamentals
1 44 Rev. 8.21
Scanning and Beaconing
Rev. 8.21 37
Scanning and Beaconing
Is anybodyout there?
Beacon framesbroadcast at
regular intervalsStation detectsbeacon, begins
handshake process
AP
Im here. My SSID is ABCWireless.-OR-
Im here, but in a closed system.
AP
Active scanningstation probes
Passive scanningstation listens for beacons
SSID: publicwifi
Fundamentals Guide: 144
When a station wants to connect to a wireless network, it must first know whether
an AP is within range, and if so, what WLAN or WLANs the AP supports. This
process of discovery is called scanning.
A station can scan for APs in two ways:
Active scanning
Passive scanning
Active Scanning
In active scanning (also called probing), stations send out probe request frames ona particular channel. APs within range operating on that channel respond with a
probe response frame containing information about their capabilities, data rates,
and so on. The slide illustrates this process in the upper exchange between station
and AP.
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
53/118
Wireless Network Technologies and Specifications
Rev. 8.21 1 45
Passive Scanning
In passive scanning, stations listen for beacon frames from APs within range.Broadcast at regular intervals by APs, beacons are management frames containing
the following information:
Radio settings
Capabilities
SSID
Time stamps
Other data
Wireless stations within range detect the beacon frames and can then move to thenext step in the connection process. The slide illustrates beaconing and passive
scanning in the lower exchange between station and AP.
A station can listen for beacon frames on all supported channels. This type of
passive scanning is called sweeping.
Preparing to Connect
If multiple APs are within range, the station chooses which one to associate with
based on signal strength. At the same time, the station builds a table to keep track
of SSIDs and other connection data. If the station changes location, it can morequickly reconnect to another AP that supports the correct SSID using the data
compiled in the table.
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
54/118
ProCurve Wireless Fundamentals
1 46 Rev. 8.21
Getting Connected
Rev. 8.21 38
Getting Connected
Open-System Authentication
Association
802.11 Authentication(required, 2 options)
Shared-Key Authentication
Network Access
Supplemental authentication
Fundamentals Guide: 146
When a scan shows that APs are within range and wireless network access is
available, the station begins the process of joining the network.
802.11 Authentication
First, the station initiates a series of negotiations with the AP. These negotiations
are often referred to as a handshake, but in the 802.11 standards they are more
formally known as authentication.
The most basic option for 802.11 authentication is open-system authentication. If
Wired Equivalent Privacy (WEP) is enabled, stations can instead use shared-key
authentication to prove their legitimacy to the AP or Wireless Module.
802.11 Association
If the 802.11 authentication is successful, a station proceeds to a formal
association with the AP.
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
55/118
Wireless Network Technologies and Specifications
Rev. 8.21 1 47
Supplemental Authentication
The term authenticationcan mean different things in wireless networks, and youmust evaluate which meaning is intended when the term is used. In reality, 802.11
open-system authentication is more a pre-association handshake than actual
authentication: open-system authentication does not establish identity and
legitimacy as the term authenticationtypically implies. Shared-key authentication,which was developed to provide true authentication for wireless networks, is
flawed in many ways.
To overcome the limitations of open-system and shared-key authentication, many
WLANs require supplemental authentication after the 802.11 association. Thissupplemental authentication is recommended as a much more stringent protection
measure than those outlined in the 802.11 standard.
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
56/118
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
57/118
Wireless Network Technologies and Specifications
Rev. 8.21 1 49
Shared-Key Authentication
Rev. 8.21 40
Shared-Key Authentication
Authentication request
Authentication response+ challenge text
1
2
Encrypted challenge text
Authenticationsuccess or failure
3
4
AP
Stations must encrypt a challenge with the correct key toauthenticate.
Fundamentals Guide: 149
A slightly more elaborate authentication exchange can take place if a WLAN is
configured to use WEP security.
NoteWLANs using WEP can also require open-system authentication. In fact, this
is the recommended option.
Shared-key authentication assumes that each device is already in possession of the
same key, enabling the device to encrypt and decrypt data contained in frames. In
order to join the network, the station must prove to the AP that it has the correctkey and should therefore be granted network access.
The following frames are exchanged for shared-key authentication:
1. The station issues an authentication request frame, containing the stations
MAC address and a value indicating shared-key authentication.2. The AP issues a response frame containing challenge texta 128-byte,
randomly generated data stream.
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
58/118
ProCurve Wireless Fundamentals
1 50 Rev. 8.21
3. Using the key it should already possess, the station encrypts the challengetext from the AP and sends it back.
4. Using the same key, the AP decrypts the challenge text received from thestation. If the decrypted challenge text matches that sent in the second frame,
the authentication is successful. The final frame in the exchange indicates
authentication success or failure.
If successful, the station may then proceed to the association process. As with
open-system authentication, the station is now authenticated but not yet associated
and cannot yet send data to the wired network.
Note
A WLAN that uses shared-key authentication cannot use the more secure
supplemental authentication of 802.1X after association. For the best possible
security, use open-system authentication in the pre-association stage and
supplemental authentication after association.
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
59/118
Wireless Network Technologies and Specifications
Rev. 8.21 1 51
Association
Rev. 8.21 41
Association
Association request frame
Association response:Association ID (AID)
1
2
Stations cannot send data until associated.
Association follows authentication.
AP
Fundamentals Guide: 151
If the pre-association authentication is successful, the station sends an association
request frame to the AP, which can accept or reject the request. If it accepts the
association, the AP assigns an AID to the station and allocates RAM and other
resources to the connection. The AP registers the station on the network so thatframes destined for the new station are sent to the correct AP for processing.
If no supplemental authentication is in place, the station is now authenticated and
associated and is a part of the network. The station is allowed to transmit data
frames, and the AP begins to process frames for it. The association remains activeuntil it is terminated by either party. Stations cannot associate with more than one
AP at a time. They can, however, roam and re-associate to a new AP in the
same WLAN.
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
60/118
ProCurve Wireless Fundamentals
1 52 Rev. 8.21
Supplemental Authentication
Rev. 8.21 42
Supplemental Authentication
Association comes up
Authentication exchange
1
2
Success or failure3
After associating, stations must authenticate to a network RADIUS
server.
The exact procedure depends on which supplemental authenticationmethod is used.
AP
Fundamentals Guide: 152
RADIUSserver
2
2
3
3
When a WLAN requires supplemental authentication, another process follows
successful association before a user is granted network access. The station is still
authenticated and associated, but is not yet permitted to fully access the network.
The exact authentication process varies, depending on the selected method.Supplemental authentication is vital to wireless network security because it
ensures that only authorized users access the network. Pre-association
authentication may attempt to use the MAC address or shared keys to grant access
to the correct stations, but methods such as 802.1X more rigorously ensure thatonly legitimate users connect.
802.1X, one of the most common supplemental authentication methods, shuts
down the association until the user authenticates. 802.1X authentication is defined
by IEEE standards. Based on user credentials and digital certificates, thesestandards address security weaknesses in the original 802.11 standards.
This slide shows a general overview of 802.1X authentication:
1. The association between a station and AP opens.
2. The AP then helps the station authenticate itself to a network RemoteAuthentication Dial-In User Service (RADIUS) server. Depending on theauthentication method chosen, the station and the server might exchange
certificates, challenge text, encryption keys, or other security parameters.
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
61/118
Wireless Network Technologies and Specifications
Rev. 8.21 1 53
3. When the process is finished, the RADIUS server sends an authenticationsuccess or failure frame, and the AP forwards it to the station. If
authentication is successful, the station also receives the encryption keys it
will use to decrypt received frames and encrypt transmitted frames.
The user perceives the successful completion of supplemental authentication as theinterface coming up or the wireless network being online, and he is now permitted
to access network resources appropriate for his credentials.
To improve network security, 802.1X authentication can be reinitiated at random
or regular intervals throughout a session, ensuring that encryption keys are
changed often enough to make interception and eavesdropping more difficult.
8/10/2019 Wireless Fundamentals v821 C May 08 WW Eng Ltr
62/118
ProCurve Wireless Fundamentals
1 54 Rev. 8.21
Summary
Rev. 8.21 43
Summary
Main features of 802.11a, b, g, h, and n standards
Three operating modes for wireless networks
Logical architecture for wireless networks (BSSID, SSID, and WLAN)
Frames exchanged to enable communication between an AP and astation
Fu