16.05.2014 Views

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

24 Chapter 2<br />

Transmission of the message across the Internet is achieved through a number of deviceto-device<br />

hops involving the PHY and data link layers of each routing or relaying device<br />

in the chain. At each step, the data link layer of the receiving device determines the MAC<br />

address of the next immediate destination, and the PHY layer transmits the packet to the<br />

device with that MAC address.<br />

On arrival at the receiving computer, the PHY layer will demodulate and decode the<br />

voltages and frequencies detected from the transmission medium, and pass the received<br />

data stream up to the data link layer. Here the MAC and LLC elements, such as a<br />

message integrity check, will be extracted from the data stream and executed, and the<br />

message plus instructions passed up the protocol stack. At Layer 4, a protocol such as<br />

Transport Control Protocol (TCP), will ensure that all data frames making up the message<br />

have been received and will provide error recovery if any frames have gone missing.<br />

Finally the e-mail application will receive the decoded ASCII characters that make up the<br />

original transmitted message.<br />

Standards for many layers of the OSI model have been produced by various organizations<br />

such as the Institute of Electrical and Electronics Engineers (IEEE). Each standard details<br />

the services that are provided within the relevant layer and the protocols or rules that must<br />

be followed to enable devices or other layers to call on those services. In fact, multiple<br />

standards are often developed for each layer, and they either compete until one emerges<br />

as the industry “ standard ” or else they peacefully coexist in niche areas.<br />

The logical architecture of a wireless network is determined principally by standards that<br />

cover the data link (LLC plus MAC) and PHY layers of the OSI model. The following<br />

sections will give a preliminary introduction to these standards and protocols, while more<br />

detailed descriptions will be found in Parts III to V where local area (LAN), personal area<br />

(PAN) and metropolitan area (MAN) wireless networking technologies are described,<br />

respectively.<br />

The next section starts this introductory sketch one layer higher—at the Network layer—not<br />

because this layer is specific to wireless networking, but because of the fundamental<br />

importance of its addressing and routing functions and of the underlying Internet Protocol (IP).<br />

2.2 Network Layer Technologies<br />

The Internet protocol (IP) is responsible for addressing and routing each data packet<br />

within a session or connection set up under the control of transport layer protocols such<br />

www.newnespress.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!