The basic building block of an 802.11 WLAN
The Basic Service Set is the basic building block of 802.11 WLAN. It includes wireless sessions that execute MAC protocol (Mitchell et al., 2005). It also competes for getting access to the similar shared medium. An extended service set can be defined as a combination of more than two service sets that are connected together using a distribution system.
Definition of extended service set
One of the components of IEEE 802.11 WLAN is the ESS or Extended Service Set. It extends the mobility range to BSS or Basic Service Set. A combination of more than two BSS forms a subnetwork. The ESS consists of a BSS set, and it should also include an SSID or Service Set Identifier. The BSSs can either function on the same channel or on different channels. This, in turn, enhances the signal across the wireless network.
Definition of IEEE 802.11 services
It can be defined as a service that provides LLC layer functions. The LLC layer sends MSUDs or MAC Service Data Units between two network entities. The services implemented by the MAC layer can be categorized into station services and distribution system services. Don't use plagiarised sources.Get your custom essay just from $11/page
Differences between the Distribution system and wireless network
A distribution system can be defined as a network consisting of transmission lines, transformers, and underground cables. The system carries a small quantity of power and distributes it in low and medium voltage levels. On the other hand, a wireless network is not connected via cables. This, in turn, reduces the additional costs of cables or different equipment locations.
Concept of an association related to mobility
Mobility mainly refers to mobile devices, and the security of mobile devices is vital for ensuring the smooth running of the devices. As soon as the authentication process gets completed, it would be easier for mobile devices to associate it with any router or AP. It will be easier to deliver frames once the association gets completed. In the case of wireless infrastructure, the association is possible. Association and mobility are not possible in case of peer-peer mode. At one time, one station can associate with a single router or AP.
Security areas addressed by IEEE 802.11i
The IEEE 802.11i addresses four types of security areas, such as key management, data confidentiality, authentication, and data integrity (Chen, Jiang & Liu, 2005). Key management mainly refers to the supervision of cryptographic keys within the cryptosystem. Another security area is confidentiality that can protect the information. Only authorized individuals should gain access to confidential data. Sudden failure in confidentiality can lead to a security breach. Authentication allows access to individuals based on identity only, and data integrity ensures consistency as well as the accuracy of information.
Five IEEE 802.11i phases of operation
The phases of operation of IEEE 802.11i has been listed below-
- Phase 1- Discovery
- Phase 2- Authentication
- Phase 3- Key Management
- Phase 4- Protected Data Transfer
- Phase 5- Connection Termination
Difference between TKIP and CCMP
CCMP has been designed for an encryption protocol, while TKIP has been designed as a security protocol for IEEE 802.11. Both CCMP and TKIP support data confidentiality and message integrity services. The CCMP uses CBC-MAC while the TKIP uses MIC or Message Integrity Code. Both the systems use two different techniques for ensuring data confidentiality. The CTR based AES processing is used by CCMP while the RC4 is used by TKIP. Again, TKIP uses only three features for ensuring security, while CCMP mainly uses five different features for ensuring security.