ungureanuvladvictor

Networks HW4

Nov 6th, 2013
97
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Latex 5.46 KB | None | 0 0
  1. \documentclass[a4paper,10pt]{article}
  2. \usepackage[utf8]{inputenc}
  3.  
  4. %opening
  5. \title{Computer Networks HW4}
  6. \author{Vlad Ungureanu}
  7.  
  8. \begin{document}
  9.  
  10. \maketitle
  11.  
  12.  
  13. \section{What is the purpose of the RTS and CTS frames? When are they used?}
  14.  \indent \indent RTS/CTS (Request to send / Clear to send) is used by 802.11 to implement a virtual carrier sense. When a node wants to send something he issues a RTS to the destination node.
  15.  The destination node issues a CTS if it can receive data. Any other nodes that receive the RTS/CTS will wait a defined time (backoff time) until they start normal communication.
  16.  The RTS/CTS mechanism is used for large packets that will create overhead on the network if they are sent multiple times on the network.\\
  17.  \indent This method clears the hidden node problem where 2 nodes cannot directly speak with eachother but they can reach a common access point.
  18. \section{Why are link-layer acknowledgements used in IEEE 802.11 wireless networks but not in IEEE
  19. 802.3 wired Ethernet networks?}
  20.  \indent \indent 802.11 uses LLC and MAC. The LLC is the same as in 802.3 LAN networks but the MAC is unique to 802.11 networks.
  21.  We need the MAC for 802.11 because:
  22.  \begin{itemize}
  23.   \item Near/Far problem: To detect a colision a station must transmit/receive at the same time but when transmitting a station cannot hear for collisions.
  24.   \item Hidden Node problem: There are 2 stations with a common AP, both can see the AP but cannot see eachother.
  25.   \item Power issue: When having portable devices the battery power is drained very fast when you have continous reply to packets.
  26.  \end{itemize}
  27.  MAC solves the problems like following:
  28.  \begin{itemize}
  29.   \item Near/Far problem: When a station wants to send something first listens if there is no traffic on the network, if so it waits a randomly chosen time then transmmits data if the network is still free.
  30.   In this way the chances of collision are reduced but does not imply that they do not happen. To overcome this issue the ACK check has been implemented.
  31.   The receiving station sends an ACK packet meaning that it receives the data. If the sender receives the ACK this ends the process.
  32.   If the ACK is not reiceived by the sender that means that a collision has happened and the data is sent again after a fallback timer has expired.
  33.   \item Hidden Node problem: Here RTS/CTS are implemented. Description on how they work is described above in question 1.
  34.   \item Also MAC implements CRC checksums to check if data is intact. Packet fragmentation is allowed on packets bigger than the treshold *MAC layer assembling them at destination*.
  35.  \end{itemize}
  36.  
  37.  
  38. \section{The IEEE 802.11 frame format includes a duration field. What is the purpose of the field?}
  39.  Duration field is 16 bits in length.
  40.  We need to discuss the duration field in case of 2 frames.
  41. \begin{itemize}
  42. \item RTS Frame: here the field contains the value in uS of time need to transmit data or management+CTS+ACK+SIFS interval.
  43. \item CTS Frame: here the field contains the value in uS obtained by the previous RTS substracted the time to transmit CTS and it SIFS interval.
  44. \end{itemize}
  45. We have extra rules on how to set the duration:
  46. \begin{enumerate}
  47. \item Contention-free perios we set duration to 32768.
  48. \item Frames transmitted to a broadcast or multicast destination have a duration of 0.
  49. \item If MF bit is not set the duration is SIFS + ACK
  50. \item if MF bit is set the duration is fragment + 3*SIFS + 2*ACK
  51. \end{enumerate}
  52. \section{Explain the terms BSS, BSSID, SSID, ESS and ESSID (in infrastructure mode) and how they relate to each other.}
  53.  \subsection{SSID}
  54.    SSID = Service set identification is a 1 to 32 byte string that represents the name of the wireless network *from 1 up to 32 bytes*.
  55.  \subsection{BSS}
  56.    BSS = Basic Service Set is the set of all stations that can *speak* with each other. Every BSS has a BSSID which is the MAC of the AP of the BSS.
  57.  \subsection{BSSID}
  58.    BSSID = Basic Service Set Identifier is the MAC address of the access point servicing the BSS.
  59.  \subsection{ESS}
  60.    ESS = Extended Service Set is a set of connected BSS that have the same SSID, credentials and settings.
  61.  \subsection{ESSID}
  62.    ESSID = Extended Service Set Identifier. When in ad-hoc mode the BSSID is used as ESSID but when in infrastructure mode the SSID is uesd as ESSID.
  63. \section{How are IP packets encapsulated in IEEE 802.11 wireless frames?}
  64.  (Frame)-$>$(Radiotap Header)-$>$(IEE 802.11 Data)-$>$(LLC)-$>$(IP)\\
  65.  Radiotap Header is a way to inform the user about the wireless network. This header is injected by the device driver.
  66.  IEEE 802.11 Data is the layer 2 datagram used in wireless communication. They can be management frames, control frames or normal frames that carry IP data. Each frame has MAC header, the payload and a frame check sequence.
  67.  From here on the same principle as in IEEE 802.3 applies with the data.
  68. \section{Load the packet trace into wireshark. How can filter out all beacon management frames? How many wireless BSSs are sending beacons? What are their BSSIDs and SSIDs? Which wireless channels are used?}
  69.  To filter beacon management: wlan.fc.type\_subtype==8.\\
  70.  There are 2 BSS that are sending beacons: freebsd-ap and Broadcast.\\
  71.  'freebsd-ap' has BSSID 06:03:7f:07:a0:16 and SSID freebsd-ap.\\
  72.  'Broadcast' has BSSID 00:00:00:00:00:00 and SSID Broadcast.\\
  73.  The same channel number is used 36 *frequency 5180* but on different antennas.
  74. \end{document}
Advertisement
Add Comment
Please, Sign In to add comment