Chapter 03 - Part 2 - 802.11 MAC
Chapter 03 - Part 2 - 802.11 MAC
11 and NICs
Part 2 – 802.11 MAC
X
xxx
Y yyy
Distribution System (DS)
xxx yyy
IP Packet
X
Y
Distribution System (DS)
A C
B D
Note: Some
Function ToDS FromDS documentation is
IBSS (no AP) 0 0 misleading stating that the
ToDS is set to 1 only
To AP 1 0
when the destination is on
From AP 0 1 the wired side of the AP.
Wireless bridge to bridge
Rick Graziani [email protected]
1 1 11
802.11 MAC Addressing –
Frame Control Field
X
xxx
Y
Distribution System (DS)
• Besides the BSSID MAC address, the access point has a MAC
address for other interfaces.
– Ethernet (LAN)
– Ethernet (WAN)
– 802.11a for dual mode APs
Router Information
• IP Address: (received via DHCP)
• MAC Address: 00:0F:66:09:4E:10
Local Network
• MAC Address: 00:0F:66:09:4E:0F
• IP Address: 192.168.1.1 MAC address for
AP’s IP address
Wireless
• MAC Address: 00:0F:66:09:4E:11
BSSID
• SSID: GuidoNet2
• DHCP Server: Enabled
• Channel: 11
• Encryption Function: Enabled
Rick Graziani [email protected] 17
802.11 MAC X
Addressing xxx
Distribution System (DS)
Y
1 0
0 1
1 0
copied
Host A to AP 1
xxx aaa
• The Ethernet DA and SA are the source and destination addresses just like on
traditional Ethernet networks.
– Destination Address – Host X
– Source Address – Host A
Rick Graziani [email protected] 21
802.11 MAC X
Addressing xxx
Distribution System (DS)
Y
1 0 copied
• The AP (bridge) knows which MAC address on on its wireless interface and
maintains a table with those MAC addresses. (from the Association process – later)
• When the AP receives an 802.11 frame, it examines the Address 3 address.
• If Address 3 is not in its table of wireless MACs it knows it needs to translate the
frame to an Ethernet frame.
• The AP copies the Address 3 address to the Ethernet Destination Address, and
Address
Rick 2 (Transmitter address) is copied to the Ethernet Source Address.
Graziani [email protected] 22
802.11 MAC
Addressing
Host X to Host A
X
xxx
Y
Distribution System (DS)
111
Access Point 1 Access Point 2
A B C
bbb
D
aaa
AP 1 to Host A
Rec. Trans. SA
802.11 Frame aaa 111 xxx
0 1
Destination Address –
Host X
AP 1 to Host A copied Source Address – Host A
Rec. Trans. SA
802.11 Frame aaa 111 xxx
0 1
• The AP (bridge) knows which MAC address on on its wireless interface and
maintains a table with those MAC addresses. (via Association process – later)
• When the AP receives an Ethernet frame, it examines the Destination address.
• If Destination Address is in its table of wireless MACs it knows it needs to translate the frame
to an 802.11 frame.
• The AP copies the Destination address to the 802.11 Address 1, and Ethernet Source is
copied to the Address 3 address (SA in this case). (Flood out all ports unless in Source
Address
Rick Graziani Table.)
[email protected] 25
802.11 MAC Addressing
xxx 1
2
xxx aaa
111
aaa
• The only word of caution is that there are two types of LLC encapsulation, RFC
1042 and 802.1h.
• On a rare occasion, you might find a problem with a client associating to an AP
when their LLCs do not match.
Station Connectivity
Power Save Operations
802.11 Frame Formats
Station Connectivity
• Passive scans, carried out by listening to Beacons from APs, are not
usually displayed by a network analyzer (Ethereal, Airopeek, etc.) but
can be.
• Microsecond – millionth of a second
• Millisecond – thousandth of a second
• A common beacon interval is 100 time units.
• Beacon interval is the number of time units between beacon
transmissions.
– One unit of time is 1,024 microseconds or about 1 millisecond.
– A beacon interval of 100 is equivalent to 100 milliseconds or 0.1
seconds.
– That would be 10 beacons per second.
Rick Graziani [email protected] 40
Setting the beacon interval on an AP (later)
• AP features (options)
– The SSID can be “hidden” or “cloaked” in the beacon frame (can
be done on Cisco APs)
– Do not send AP broadcast beacons (not an option with Cisco APs)
• From some mailing lists:
– “SSID cloaking and beacon hiding isn't necessarily a bad thing, but too
many places use it as the only protection because it leads to a false sense
of security.”
– “Obscurity != security. Too many companies blindly trust that no beaconing
or hiding their SSID means they're automatically safe.”
Rick Graziani [email protected] 43
Station Connectivity – Active Scanning
• Active Scanning: Probe Request
– This process is not mandatory on with
802.11.
– A Probe Request frame is sent out on
every channel (1 – 11) by the client.
– APs that receive Probe Requests must
reply with a Probe Response frame if:
• SSID matches or
• Probe Request had a broadcast
SSID (0 byte SSID)
• NetStumber uses active scanning
From the client
Source address is
the client (host)
From the AP
No SSID
Probe Request
Broadcast (no) SSID Probe Response
SSID = tsunami
ACK
• Access Points can be configured whether or not to allow clients with broadcast
SSIDs to continue the connectivity process.
– If there is no authentication on the AP, then the client will most likely
“associate” and be on their network!
• Cisco APs use a default SSID of tsunami known as the “guest mode” SSID.
(coming)
• Unless this feature is disabled or authentication is enabled, anyone can easily
associate with your AP and access your network (or the Internet).
Rick Graziani [email protected] 50
Station Connectivity
• The client:
– Sets the Authentication Algorithm Number to 0 (open-system)
– Set Authentication Transaction Sequence Number to 1
• The AP:
– Sets the Authentication Algorithm Number to 0 (open-system)
– Set Authentication Transaction Sequence Number to 2
– Status Code set to 0 (Successful)
Rick Graziani [email protected] 54
Authentication Process – Shared-Key
• The client:
– Sets the Authentication Algorithm Number to 1 (shared-key)
– Set Authentication Transaction Sequence Number to 1
• The AP:
– Sets the Authentication Algorithm Number to 1 (shared-key)
– Set Authentication Transaction Sequence Number to 2
– Status Code set to 0 (Successful)
– Challenge Text (later)
• The client:
– Sets the Authentication Algorithm Number to 1 (shared-key)
– Set Authentication Transaction Sequence Number to 3
– Challenge Text (later)
• The AP:
– Sets the Authentication Algorithm Number to 1 (shared-key)
– Set Authentication Transaction Sequence Number to 4
– Status Code set to 0 (Successful)
Rick Graziani [email protected] 56
Authentication Process
• Authentication
– Open-System
– Shared-Key (WEP)
• Encryption
– None only
or
– WEP
Beacon
Authentication SSID = tsunami
Request Authentication
Response
(Open-system)
• If not configured specifically to look for a network, some client utilities
will automatically join the network that meets their vendor’s criteria (not
specified in 802.11) such as signal strength and open-system
authentication.
• How a station chooses an AP is not specified in 802.11.
•RickOr just find the open-system network and join.
Graziani [email protected] 59
Station Connectivity
1. Association Request
2. Association
Response
• Traffic can now flow between the client and the AP.
• Disassociation and deauthentication can be due to:
– Inactivity
– The AP cannot handle all currently associated stations
– Station has left BSS
– etc.
AP2
• In the lab we will need to take steps to make sure you are configuring
and connected to the AP that you think you are!
• We will first connect via a wired interface, change the SSID and IP
addressing on the AP, different from what the labs show.
Rick Graziani [email protected] 65
802.11 Overview and MAC Layer
Part 1 – 802.11 MAC and Cisco • 2.4 – 2.6 Online Curriculum
Client Adapters – Client Adapters
• (Separate Presentation) – Aironet Client Utility (ACU)
• 2.1 Online Curriculum
– ACU Monitoring and
– 802.11 Standards
Troubleshooting Tools
• Overview of WLAN Topologies
– IBSS
– BSS Part 2 – 802.11 MAC
– ESS • 802.11 Data Frames and
– Access Points Addressing
• 802.11 Medium Access • 802.11 MAC Layer Operations
Mechanisms – Station Connectivity
– DCF Operations – Power Save Operations
– Hidden Node Problem – 802.11 Frame Formats
– RTS/CTS • Non-standard devices
– Frame Fragmentation
Rick Graziani [email protected] 66
Power Save (PS) Operations
beacon
Frame 1
ACK
The basics:
• If there are frames buffered for this station it will poll the AP for those
frames.
• The AP will then send the frames to the station.
1. Association Request
2. Association
Response
Frame 1
ACK
• For example:
– If the listening interval on the client is 200 the client wakes up every
200 beacons.
– If the AP beacon interval is 100 (10 beacons per second)
– The client will wake up every 20 seconds.to see if there are any frames
buffered for it.
• You won’t find an exact match here between the protocol decode and
the TIM.
• See the Cisco Press book 802.11 Wireless LAN Fundamentals if you
are interested in how this works.
Rick Graziani [email protected] 78
Broadcast/Multicast Power Save Operations
• Broadcast and multicast traffic is buffered at the AP for all stations (including
non-PS stations) when at least one associated station is in PS mode.
• The network administrator defines the interval for the client to wake up to
receive broadcast and multicast traffic.
• A special TIM, known as a DTIM (Delivery Traffic Indication Map) indicates
whether or not there is broadcast/multicast traffic buffered on the AP.
• If the TIM’s, DTIM Count field is 0, the AP has broadcast/multicast frames.
• DTIM information is not sent in every beacon, but on every DTIM count period
(10th beacon in this example), and “getting in sync” depends on vendor.
• Rest of details can be found in Matthew Gast’s book if you are interested.
Rick Graziani [email protected] 79
802.11 Frame Formats
802.11 Frame Formats (Some of them)
• The following diagrams are FYI and from Cisco Press book 802.11 Wireless LAN
Fundamentals by Pejman Roshan and Jonathan Leary.
802.11 Frames • Management Frames
• Data Frames (most are PCF) – Beacon
– Data – Probe Request
– Null data – Probe Response
– Data+CF+Ack – Authentication
– Data+CF+Poll – Deauthentication
– Data+CF+Ac+CF+Poll – Association Request
– CF-Ack – Association Response
– CF-Poll – Reassociation Request
– CF-Cak+CF-Poll – Reassociation Response
• Control Frames – Disassociation
– RTS – Announcement Traffic Indication
– CTS
– ACK
– CF-End
– CF-End+CF-Ack
Rick Graziani [email protected] 81
802.11 Data Frame