This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

The basic building block of an 802.11 WLAN

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

The basic building block of an 802.11 WLAN

The Basic Service Set is the basic building block of 802.11 WLAN. It includes wireless sessions that execute MAC protocol (Mitchell et al., 2005). It also competes for getting access to the similar shared medium. An extended service set can be defined as a combination of more than two service sets that are connected together using a distribution system.

Definition of extended service set

One of the components of IEEE 802.11 WLAN is the ESS or Extended Service Set. It extends the mobility range to BSS or Basic Service Set. A combination of more than two BSS forms a subnetwork. The ESS consists of a BSS set, and it should also include an SSID or Service Set Identifier. The BSSs can either function on the same channel or on different channels. This, in turn, enhances the signal across the wireless network.

Definition of IEEE 802.11 services

It can be defined as a service that provides LLC layer functions. The LLC layer sends MSUDs or MAC Service Data Units between two network entities. The services implemented by the MAC layer can be categorized into station services and distribution system services.

Don't use plagiarised sources.Get your custom essay just from $11/page

The former includes privacy, authentication, deauthentication, and lastly, MSDU delivery (Chen, Smavatkul & Emeott, 2011). The DSS consists of distribution, association, dissociation, reassociation, and integration.

Differences between the Distribution system and wireless network

A distribution system can be defined as a network consisting of transmission lines, transformers, and underground cables. The system carries a small quantity of power and distributes it in low and medium voltage levels. On the other hand, a wireless network is not connected via cables. This, in turn, reduces the additional costs of cables or different equipment locations.

Concept of an association related to mobility

Mobility mainly refers to mobile devices, and the security of mobile devices is vital for ensuring the smooth running of the devices. As soon as the authentication process gets completed, it would be easier for mobile devices to associate it with any router or AP. It will be easier to deliver frames once the association gets completed. In the case of wireless infrastructure, the association is possible. Association and mobility are not possible in case of peer-peer mode. At one time, one station can associate with a single router or AP.

Security areas addressed by IEEE 802.11i

The IEEE 802.11i addresses four types of security areas, such as key management, data confidentiality, authentication, and data integrity (Chen, Jiang & Liu, 2005). Key management mainly refers to the supervision of cryptographic keys within the cryptosystem. Another security area is confidentiality that can protect the information. Only authorized individuals should gain access to confidential data. Sudden failure in confidentiality can lead to a security breach. Authentication allows access to individuals based on identity only, and data integrity ensures consistency as well as the accuracy of information.

Five IEEE 802.11i phases of operation

The phases of operation of IEEE 802.11i has been listed below-

  • Phase 1- Discovery
  • Phase 2- Authentication
  • Phase 3- Key Management
  • Phase 4- Protected Data Transfer
  • Phase 5- Connection Termination

Difference between TKIP and CCMP

CCMP has been designed for an encryption protocol, while TKIP has been designed as a security protocol for IEEE 802.11. Both CCMP and TKIP support data confidentiality and message integrity services. The CCMP uses CBC-MAC while the TKIP uses MIC or Message Integrity Code. Both the systems use two different techniques for ensuring data confidentiality. The CTR based AES processing is used by CCMP while the RC4 is used by TKIP. Again, TKIP uses only three features for ensuring security, while CCMP mainly uses five different features for ensuring security.

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask