03.11.2012 Views

Medium Access Control (MAC) and Physical Layer (PHY) - CISE

Medium Access Control (MAC) and Physical Layer (PHY) - CISE

Medium Access Control (MAC) and Physical Layer (PHY) - CISE

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

4-June-07 P1901_PRO_016_r0<br />

In IEEE 802.1X an access <strong>and</strong> authentication dialog is defined for the case of authenticator initiated exchange. This<br />

dialog is formed by the following sequence of messages:<br />

• Message A: Authenticator to Supplicant<br />

o EAPOL with Code field: Request (1) <strong>and</strong> Type field: Identity (1)<br />

• Message B: Supplicant to Authenticator<br />

o EAPOL with Code field: Response (2) <strong>and</strong> Type field: Identity (1)<br />

• Message C: Authenticator to Supplicant<br />

o EAPOL with Code field: Request (1) <strong>and</strong> Type field: Challenge (4)<br />

• Message D: Supplicant to Authenticator<br />

o EAPOL with Code field: Response (2) <strong>and</strong> Type field: Challenge (4)<br />

• Message E: Authenticator to Supplicant<br />

o EAPOL with Code field: Success (3) or Failure (4)<br />

In IEEE P1901 Message A of the previous dialog should be implemented by the use of the <strong>Access</strong> Frame described<br />

in section 4.3.8., Message B should be implemented by the use of the <strong>Access</strong> Reply Frame described in section<br />

4.3.9 <strong>and</strong> Message E should be implemented by the use of the <strong>Access</strong> Protocol Packet described in section 9.1.3.<br />

Messages C <strong>and</strong> D serve for the purpose of authentication. With message C the Authenticator sends a r<strong>and</strong>om<br />

challenge of 16 octets to the Supplicant <strong>and</strong> message D is the response of the Supplicant to this challenge. This<br />

Response is a 16-octet MD5 hash calculated over the r<strong>and</strong>om challenge <strong>and</strong> the secret shared by the Supplicant <strong>and</strong><br />

the Authentication Server <strong>and</strong> other fields [RFC 2865]. This secret should be the Serial Number of the Supplicant.<br />

IEEE 802.1X states that “The EAPOL encapsulation used with IEEE802.3/Ethernet can be applied to other LAN<br />

technologies that share the same basic frame format as Ethernet” as is the case of IEEE P1901 technology. As a<br />

consequence, the format of Messages C <strong>and</strong> D in IEEE P1901, which follows the rules of EAPOL packets, are<br />

encapsulated in CLPDUs. The formats are the following:<br />

Submission page 287 UPA-OPERA

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!