19.07.2013 Views

CCNA Complete Guide 2nd Edition.pdf - Cisco Learning Home

CCNA Complete Guide 2nd Edition.pdf - Cisco Learning Home

CCNA Complete Guide 2nd Edition.pdf - Cisco Learning Home

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Authentication The 802.11 authentication process is where an access point accepts<br />

or rejects the identity of a wireless adapter. A wireless adapter<br />

begins the process by sending an Authentication frame that contains<br />

its identity to the access point. For open authentication, the access<br />

point responds with an Authentication frame as a response to<br />

indicate the acceptance or rejection; while for shared-key<br />

authentication, the access point responds with an Authentication<br />

frame containing challenge text, which the wireless client must<br />

response with an Authentication frame containing the encrypted<br />

version of the challenge text using the shared-key for the access<br />

point to verify its identity. WLAN authentication occurs at L2 and<br />

is authenticating devices instead of users. The authentication and<br />

association processes are occurred in sequence.<br />

Note: Authentication occurs first and then followed by association.<br />

Deauthentication A wireless station sends a Deauthentication frame to another<br />

wireless station in order to terminate a secure connection.<br />

- Below lists the IEEE 802.11 control frames that assist the delivery of data frames between<br />

wireless stations:<br />

Request to Send (RTS) A station sends a RTS frame to another station as the 1st phase of<br />

the necessary 2-way handshake before transmitting a data frame.<br />

Clear to Send (CTS) A station response to a RTS frame with the CTS frame to provide<br />

the clearance for the source station to transmit a data frame.<br />

The CTS frame contains a time value which would cause all<br />

nearby stations (including hidden stations) to hold off data<br />

transmission for a certain period of time necessary for the source<br />

station to transmit its frames.<br />

Acknowledgement (ACK) A destination station would run an error checking process to<br />

detect the presence of errors upon received a data frame.<br />

The destination station would send an ACK frame to the source<br />

station if no errors are found. The source station will retransmit<br />

the frame if it doesn’t receive an ACK for the frame for a certain<br />

period of time.<br />

Note: Kindly refer to Page 174 for the discussion of the CSMA/CA and RTS/CTS mechanisms.<br />

- Finally, data frames are used to carry upper layers data – packets.<br />

- Below shows the wireless client association process:<br />

i) Access points send out beacons announcing the SSID and supported data rates.<br />

ii) A wireless client scans all changes and sends out Probe Request frames to all access<br />

points within range.<br />

iii) All access points within range reply with a Probe Response frame, and the wireless client<br />

listens for the responses from the access points.<br />

iv) The wireless client associates with the access point with the strongest signal.<br />

Authentication and other security information are sent to the access point.<br />

v) The access point accepts the association request and associated with the wireless client.<br />

Note: 802.1X authentication could occur straight after the association process is completed.<br />

- The maximum Ethernet frame size is 1518 bytes whereas a wireless frame could be as large as<br />

2346 bytes. Usually the WLAN frame size is limited to 1518 bytes as WLANs are often<br />

connected to and communicating with wired Ethernet networks.<br />

291<br />

Copyright © 2008 Yap Chin Hoong<br />

yapchinhoong@hotmail.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!