IEEE 802.11n - Design Details & Protocol Analysis
[2-day course, Euro 2,350.- (net) per participant]
Reviewing 802.11 Wireless LAN
- The IEEE 802.11 Alphabet
- IEEE 802.11-1999
- IEEE 802.11b
- IEEE 802.11g
- IEEE 802.11a
- IEEE 802.11e
- IEEE 802.11i
- IEEE 802.11n
- IEEE 802.11-1999
- The Physical Resource
- The ISM Band in 2.4 GHz and 5 GHz
- Channel Numbers and Allocation / 2.4 GHz
- Channel Numbers and Allocation / 5 GHz
- The ISM Band in 2.4 GHz and 5 GHz
- Network Architecture
- Infrastructure Mode
- Ad-hoc Mode
- Infrastructure Mode
- Protocol Stack of IEEE 802.11 in Context
- PDU-Types in the Protocol Stack
- MSDU, MPDU, PPDU
- MSDU, MPDU, PPDU
- Example of an IEEE 802.11 MPDU
- PDU-Types in the Protocol Stack
- Operation of IEEE 802.11
- CSMA/CA - Resource Sharing and Network Access
- Principle Operation, Format and Content of the PLCP-PDU, Physical vs. Virtual Carrier Sensing
- Principle Operation, Format and Content of the PLCP-PDU, Physical vs. Virtual Carrier Sensing
- The Different MAC-Access Coordination Functions
- Overview, Distributed Coordination Function / Example Operation, Point Coordination Function (PCF), Enhanced Distributed Channel Access (EDCA), HCF Controlled Channel Access (HCCA)
- Overview, Distributed Coordination Function / Example Operation, Point Coordination Function (PCF), Enhanced Distributed Channel Access (EDCA), HCF Controlled Channel Access (HCCA)
- CSMA/CA - Resource Sharing and Network Access
- OFDM in IEEE 802.11
- Introduction
- Normal OFDM Symbol
- Short OFDM-Symbol
- Generation
- Generation
- Long OFDM-Symbol
- Generation, Distinction in case of different Channel Bandwidth (5, 10 and 20 MHz)
- Generation, Distinction in case of different Channel Bandwidth (5, 10 and 20 MHz)
- Format of the PPDU with OFDM-PHY
- PLCP Preamble, L-SIG (SIGNAL-Field), SERVICE-Field, PSDU, Tail Bits / Padding
- PLCP Preamble, L-SIG (SIGNAL-Field), SERVICE-Field, PSDU, Tail Bits / Padding
- Introduction
- Association Process to an Access Point
- Passive Scanning
- Active Scanning
- Beacon Frame
- Exchange of Association Request / Response Frames
- Passive Scanning
Overview of 802.11n and its Enhancements
- Introduction to 802.11n-Enhancements
- The Big Picture
- Smart Antenna related Enhancements
- Packet Aggregation related Enhancements
- Channel Bonding related Enhancements
- Other Enhancements
- More Data Subcarriers / Smaller Guardband, Short Guard Interval (GI), FEC Changes, Power Saving Enhancements, Reduced Inter Frame Space (RIFS), SERVICE-Field
- More Data Subcarriers / Smaller Guardband, Short Guard Interval (GI), FEC Changes, Power Saving Enhancements, Reduced Inter Frame Space (RIFS), SERVICE-Field
- The Big Picture
- Operation with 40 MHz Bandwidth
- Overview
- Number of Subcarriers and Pilot Allocation
- Phased Coexistence Operation (PCO)
- Overview
- Transmit Beamforming
- ... with Implicit Feedback
- ... with explicit Feedback
- ... with Implicit Feedback
- Antenna Selection
Detailed Analysis of the 802.11n MAC
- Reviewing MAC-Frame Types and IE's
- Generic MAC Frame (Data Frame)
- Frame Control field, Duration ID field, Address fields, Sequence Control field, QoS Control field, Frame Body, FCS field, Details of the Frame Control Field
- Frame Control field, Duration ID field, Address fields, Sequence Control field, QoS Control field, Frame Body, FCS field, Details of the Frame Control Field
- Control Frame Subtypes
- BlockAckReq and BlockAck, PS-Poll, RTS and CTS, Ack, CF-End and CF-End+CF-Ack
- BlockAckReq and BlockAck, PS-Poll, RTS and CTS, Ack, CF-End and CF-End+CF-Ack
- Management Frame Subtypes
- Association request and Association response, Reassociation request and Reassociation response, Disassociation, Probe request and Probe response, Beacon, Announcement Traffic Information Message, Authentication and Deauthentication, Action, Action No Ack
- Association request and Association response, Reassociation request and Reassociation response, Disassociation, Probe request and Probe response, Beacon, Announcement Traffic Information Message, Authentication and Deauthentication, Action, Action No Ack
- Data Frame Subtypes
- Data frames, Null frames, CF-Ack frames, CF-Poll frames, QoS frames, Usage of the Address Fields in Data Frames
- Data frames, Null frames, CF-Ack frames, CF-Poll frames, QoS frames, Usage of the Address Fields in Data Frames
- Action Frames
- Spectrum management Action frames, QoS Action frames, DLS Action frames, Block Ack Action frames, HT Action frames
- Spectrum management Action frames, QoS Action frames, DLS Action frames, Block Ack Action frames, HT Action frames
- Generic MAC Frame (Data Frame)
- Aggregation through A-MSDU
- Practical Exercise: Evaluate a PPDU with A-MSDU inside
- Detailed Operation and Constraints
- From LLC-Frame to A-MSDU - Mapping Rules, Limitation of Frame Sizes (A-MSDU)
- From LLC-Frame to A-MSDU - Mapping Rules, Limitation of Frame Sizes (A-MSDU)
- Practical Exercise: Evaluate a PPDU with A-MSDU inside
- Aggregation through A-MPDU
- Example of an A-MPDU
- Detailed Operation and Constraints
- From LLC-Frame to A-MPDU - Mapping Rules, Limitation of Frame Sizes (A-MPDU)
- From LLC-Frame to A-MPDU - Mapping Rules, Limitation of Frame Sizes (A-MPDU)
- Combination of A-MSDU and A-MPDU Aggregation
- Practical Exercise: A-MSDU vs A-MPDU Aggregation
- Example of an A-MPDU
- BlockAck-Procedures
- Reviewing Acknowledgement Policies
- Normal Ack, No Ack, No explicit Ack, Block Ack
- Normal Ack, No Ack, No explicit Ack, Block Ack
- Option 1: Immediate BlockAck Procedure
- Setup BlockAck, Transmission of data frames, Block Ack Request – Block Ack exchange, ermination of Block Ack
- Setup BlockAck, Transmission of data frames, Block Ack Request – Block Ack exchange, ermination of Block Ack
- Option 2: Delayed Block Ack Procedure
- Setup of Delayed BlockAck's, BlockAck Request – BlockAck exchange, Switch back to normal Ack procedure in the BlockAck period, Termination of Delayed BlockAck
- Setup of Delayed BlockAck's, BlockAck Request – BlockAck exchange, Switch back to normal Ack procedure in the BlockAck period, Termination of Delayed BlockAck
- Important Changes with 802.11n
- New Format of the BlockAck Request Frame, New Format of the BlockAck Frame
- New Format of the BlockAck Request Frame, New Format of the BlockAck Frame
- Practical Exercise: Analyze a Real-Life BlockAck Session
- Reviewing Acknowledgement Policies
- Power Save Multi Poll (PSMP)
- Operation of PSMP
- Format and Content of the PSMP-Frame
- Operation of PSMP
Advanced Security through EAP (Bonus Material)
- Security Challenges
- Unauthorized use
- Forgery attacks
- Man in the middle attacks (eavesdropping)
- Replay attack
- Data truncation, concatenating, and splicing
- Iterative guessing against the key
- Redirection by modifying the MPDU DA or RA field
- Impersonation attacks by modifying the MPDU SA or TA field
- Denial of service attack
- Unauthorized use
- Overview Security
- Keys
- Ciphering
- Deciphering
- Authentication
- Integrity protection
- Keys
- Security Technologies for IEEE 802.11 194
- Overview
- Wired Equivalent Privacy (WEP), Robust Security Network (RSN), 802.1X, Extensible Authentication Protocol (EAP), Virtual Private Network
- Wired Equivalent Privacy (WEP), Robust Security Network (RSN), 802.1X, Extensible Authentication Protocol (EAP), Virtual Private Network
- Pre - RSNA Procedures
- Open System Authentication, Shared Key Authentication, The “Wired Equivalent Privacy” Procedure
- Open System Authentication, Shared Key Authentication, The “Wired Equivalent Privacy” Procedure
- RSNA Procedures
- RSNA Policy Selection, Key Hierarchy – How to Create the TK's, Types of Security Associations, RSNA Encryption and Integrity Protection Protocols,
- RSNA Policy Selection, Key Hierarchy – How to Create the TK's, Types of Security Associations, RSNA Encryption and Integrity Protection Protocols,
- Advanced Authentication
- Network Overview: Supplicant, Authenticator, Authentication Server, Redirection, Variants of EAP
- Network Overview: Supplicant, Authenticator, Authentication Server, Redirection, Variants of EAP
- Secure Session Overview
- Different Phases, Session Phase 1: Probing & Association, Session Phase 2: EAP Authentication, Session Phase 3: EAPOL 4-Way Handshake, Session Phase 4 & 5: Active Session & Disassociation
- Different Phases, Session Phase 1: Probing & Association, Session Phase 2: EAP Authentication, Session Phase 3: EAPOL 4-Way Handshake, Session Phase 4 & 5: Active Session & Disassociation
- EAP Frame Formats
- EAP Request and EAP Response Frames, EAP Success and EAP Failure Frames
- EAP Request and EAP Response Frames, EAP Success and EAP Failure Frames
- Overview
- Analysis of EAP-TLS
- EAP-TLS Protocol Structure
- EAP-TLS Procedure
- Detailed Description
- Detailed Description
- Practical Exercise: Analysis of Real-Life EAP-TLS Logfile
- EAP-TLS Procedure – Fast Reconnect
- Detailed Description
- EAP-TLS Protocol Structure
- Analysis of EAP-AKA
- EAP-AKA Protocol Structure
- EAP-AKA Procedure
- Initial Conditions, Applicability of this Procedure, Detailed Description
- Initial Conditions, Applicability of this Procedure, Detailed Description
- EAP-AKA Procedure – Fast Re-Authentication
- EAP-AKA Protocol Structure
v2.000
Search:
Advanced SearchMore Info:
General Information about this course
Schedule of this training course
Extract of this training course
Buy this book
INACON eBooks
Please have a look at our full offer