Advanced Network Security.
Objectives
This lab addresses the MAC sublayer of the IEEE 802.11 standard for the WLAN.
Submitted to:
Overview
The IEEE 802.11 standard provides wireless connectivity to computerized stations that require rapid deployment, such as portable computers. The MAC sublayer in the standard includes two fundamental access methods: distributed coordination function (DCF) and point coordination function (PCF). DCF utilizes the carrier sense multiple access with collision avoidance (CSMA/CA) approach. DCF is implemented in all stations in the wireless local area network (WLAN). PCF is based on polling to determine the station that can transmit next.
In addition to the physical CSMA/CA, DCF and PCF utilize a virtual carrier-sense mechanism to determine the state of the medium. This virtual mechanism is implemented by means of the network allocation vector (NAV), which provides each station with a prediction of future traffic on the medium. Each station uses NAV as an indicator of time periods during which transmission will not be initiated even if the station senses that the wireless medium is not busy. NAV gets the information about future traffic from management frames and the header of regular frames being exchanged in the network.
With DCF, every station senses the medium before transmitting. The transmitting station defers as long as the medium is busy. After deferral and while the medium is idle, the transmitting station has to wait for a random backoff interval. After the backoff interval and if the medium is still idle, the station initiates data transmission or optionally exchanges request to send (RTS) and clear to send (CTS) frames with the receiving station.
With PCF, the access point (AP) in the network acts as a point coordinator (PC). The PC uses polling to determine which station can initiate data transmission. It is optional for the stations in the network to participate in PCF and hence respond to polls received from the PC. Such stations are called CF-Pollable stations. The PCF requires the PC to gain control of the medium. To gain such control, the PC utilizes the Beacon management frames to set the NAV in the network stations. Because the mechanism used to set NAV is based on the DCF, all stations comply with the PC request to set their NAV, whether or not they are CF-Pollable. This way the PC can control frame transmissions in the network by generating contention-free periods (CFPs). The PC and the CF-Pollable stations do not use RTS/CTS in the CFP.
The standard allows for fragmentation of the MAC data units into smaller frames. Fragmentation is favorable in case the wireless channel is not reliable enough to transmit longer frames. Only frames with a length greater than a fragmentation threshold will be fragmented. Each fragment will be sent independently and will be separately acknowledged. During a contention period, all fragments of a single frame will be sent as bursts with a single invocation of the DCF medium access procedure. In case of PCF and during a contention-free period, fragments are sent individually following the rules of the point coordinator (PC).
Definitions
Buffer Size specifies the maximum size of the higher-layer data buffer in bits. Once the buffer limit is reached, the data packets arriving from the higher layer will be discarded until some packets are removed from the buffer so that the buffer has some free space to store these new packets.
Fragmentation Threshold specifies the fragmentation threshold in bytes. Any data packet received from a higher layer with a size greater than this threshold will be divided into fragments, which will be transmitted separately over the radio interface. Regardless of the value of this attribute, if the size of a higher-layer packet is larger than the maximum MSDU size allowed by the IEEE 802.11 WLAN standard, which is 2304 bytes, then such a packet will not be transmitted by the MAC, and it will be immediately discarded when received.
Time_average is the average value over time of the values generated during the collection window. This average is performed assuming a “sample-and-hold” behavior of the data set (i.e., each value is weighted by the amount of time separating it from the following update and the sum of all the weighted values is divided by the width of the collection window).
Delay represents the end-to-end delay of all the packets received by the wireless LAN MACs of all WLAN nodes in the network and forwarded to the higher layer. This delay includes medium access delay at the source MAC, reception of all the fragments individually, and transfer of the frames through AP, if access point functionality is enabled.
Loadrepresents the total load (in bits/sec) submitted to wireless LAN layers by all other higher layers in all WLAN nodes of the network.
Throughput represents the total number of bits (in bits/sec) forwarded from wireless LAN layers to higher layers in all WLAN nodes of the network.
Note:
To switch to a scenario, choose Switch to Scenario from the Scenarios menu or just press Ctrl+<scenario number>.
Task 1: Create a New Project
Task 2: Create and Configure the Wireless Network
Task 3: Configure the Wireless Nodes
Right-click on the node ; Edit Attributes ; Assign to the Wireless LAN MAC Address attribute a value equals to the node number (e.g., address 1 is assigned to node_1) ; Assign to the Destination Address attribute the corresponding value shown in the following table ; Click OK.
Task 4: Traffic Generation Parameters
Task 5: Choose the Statistics
To test the performance of the network in our DCF scenario, we will collect some of the available statistics as follows:
Task 6: Configure the Simulation Parameters
Analyze the result (write 3 lines about this graph)
Duplicate the Scenario
In the network we just created, we did not utilize many of the features explained in the overview section. By default, the distributed coordination function (DCF) method is used for the Medium Access Control (MAC) sublayer. We will create three more scenarios to utilize the features available from the IEEE 802.11 standard. In the DCF_Frag scenario, we will allow fragmentation of the MAC data units into smaller frames and test its effect on the network performance. The DCF_PCF scenario utilizes the point coordination function (PCF) method for the MAC sublayer along with the DCF method. Finally, in the DCF_PCF_Frag scenario we will allow fragmentation of the MAC data and check its effect along with PCF.
Task 7: THE DCF_FRAG SCENARIO
Task 8: THE DCF_PCF SCENARIO
Task 9: THE DCF_PCF_FRAG SCENARIO
Task 10: Run the Simulation for the four scenarios simultaneously:
Task 11: View the Results and analyze the results
Go to the Compare Results dialog box ; Expand the Object Statistics hierarchy ; Expand the Office Network hierarchy ; Expand the hierarchy of two nodes. One node should have PCF enabled in the DCF_PCF scenario (e.g., node_3) and the other node should have PCF disabled (e.g., node_2) ; Show the result of the Delay (sec) statistic for the chosen nodes.
Deliverables ( analyze each screen shot result) in this part for the questions
LAB REPORT
Prepare a report that follows the guidelines explained in the Introduction Lab. The report should include the answers to the deliverables as well as the graphs you generated from the simulation scenarios. Discuss the results you obtained and compare these results with your expectations. Mention any anomalies or unexplained behaviors.