Sunteți pe pagina 1din 3

1. What is the basic building block of an 802.11 WLAN?

The basic building block of the WLAN network is the 802.11 basic service set (BS S). A BSS defines a coverage area where all stations within the BSS remain fu lly connected. 2. Define an extended service set. An Extended Service Set (ESS) is a set of two or more BSSs that form a single su b network. 3. List and briefly define IEEE 802.11 services. There are 9 services that need to be provided by a wireless LAN to achieve funct ionality equivalent to that of a wired LAN: 1) MSDU delivery - the basic service which is responsible for the basic transport of MAC service data units (MSDUs) - MSDU is a block of data passed down from the MAC user to the MAC layer. The MS DU is typically a LLC PDU. If too large, it can be fragmented and passed down as MAC frames. 2) Distribution - is the primary service used by statios to exchang e MAC frames when the frames must traverse the DS from one BSS to another BSS. E xample STA2 to STA7. Requires information about stations in ESS(info is provided by association-related services). 3) Integration- enables the transfer of data between a station on an IEEE 802.11 LAN and a station on an integrated IEEE 802. x LAN. Takes care of any address translation andmedia conversion log required fo r exchanging data. 4) Association - Establishes an initial associaten between a station and an AP (an address is required for a station on a wireless LAN). 5) R eassociation - enables an established association to be transferred from one BSS to another (mobility management). 6) Disassociation - Terminates an association . 7) Authentication - Establishes the identity of stations to each other. 8) Dea uthentication - Terminates an existing authentication 9) Privacy - Prevents tran smission from being read by others 4. Is a distrubtion system a wireless network? A DS can be a wired network, a wireless network or a switch 5. How is the concept of an association related to that of mobility? The primary purpose of the MAC layer is to transfer MSDUs between MAC entities; this purpose is fulfilled by the DS. Before the DS can deliver data to or accept data from a station that station must be associated. The mobility of the statio n is integral to associatin that station. There are 3 mobility transition types: No transition - A station of this type is stationary or moves only within a sin gle BSS, BSS transition - a station of this type moves from one BSS to another B SS within the same ESS, and ESS transition - a station of this type moves from a BSS in one ESS to a BSS within another ESS. 6. What security areas are addressed by IEEE 802.11i? IEEE 802.11i addresses three main security areas: authentication, key management , and data transfer privacy. 7. Briefly describe the four IEEE 802.11i phases of operation. Discovery: An AP uses messages called Beacons and Probe Responses to advertise i ts IEEE 802.11i security policy. The STA uses these to identify an AP for a WLAN with which it wishes to communicate. Authentication: During this phase, the STA and AS prove their identities to each other.The AP blocks non-authentication traffic between the STA and AS until the authentication transaction is successful.

Key generation and distribution: The AP and the STA perform several operations that cause cryptographic keys to be generated and placed on the AP and the STA. Protected data transfer: Frames are exchanged between the STA and the end station through the AP. Connection termination: The AP and STA exchange frames. During this phase, the secure connection is torn down and the connection is restored to the original state. 8. What is the difference between TKIP and CCMP? TKIP is designed to require only software changes to devices that are implemente d with the older wireless LAN security approach called WEP. TKIP provides two se rvices; message integrity and data confidentiality. CCMP is intended for newer IEEE 802.11 devices that are equired with the hardwar e to support this schema. CCMP provides two services; message integrity and data confidentiality. 9. What is the difference between an HTML filter and a WAP proxy? N/A 10. What services are provided by WSP? WSP provides applications with an interface for two session services. The connec tion-oritented session service operates above WTP, and the connectionless sessio n service operates above the unreliable transport protocol WDP. In essence,WSP i s based on HTTP with some additions and modifications to optimize its use over w ireless channels. The principal limitations addressed are low data rate and susc eptibility to loss of connection due to poor coverage or cell overloading. 11. When would each of the three WTP transaction classes be used? Class 0: Unreliable invoke message with no result message, which can be used for a unreablible push operation. Class 1: Reliable invoke message with no result message, which can be used for a reliable push operation. Class 2: Unreliable invoke message with one reliable result message. Provides a request/response transaction service and supports the execution of multiple tran sactions during one WSP session. 12. List and briefly define the security services provided by WTLS. Data Integrity: Uses message authentication to ensure that data sent between the client and the gateway are not modified. Privacy: Uses encryption to ensure that the data cannot be read by a third party . Authentication: Uses digital certificates to authenticate the parties. Denial-of-service protection: Detects and rejects message that are replayed or n ot successfully verified. 13. Briefly describe the four protocol elements of WTLS. Handshake protocol: The most complex part of WTLS is the Handshake Protocol.This protocol allows the server and client to authenticate each other and to negotia te an encryption and MAC algorithms and cryptographic keys to be used to protect data sent in a WTLS record. Change ciper spec protol: Associated with the current transaction is a cipher spec, which specifies the encryption algorithm, the hash algorithm used a s part of HMAC, and cryptographic attributes, such as MAC code size. There are t

wo states associated with each session. Once a session is established, there is a current operating state for both read and write (i.e., receive and send). Alter protocol: The Alert Protocol is used to convey WTLS-related alerts to the peer entity. As with other applications that use WTLS, alert messages are compre ssed and encrypted, as specified by the current state. Wireless tranaction protocol (WTP): Manages transactions by conveying requests and responses between a user agent (such as a WAP browser) and an application server for such activities as browsing and e-commerce transactions. 14. List and briefly define all of the keys used in WTSLS. The server begins this phase by sending its public-key certificate if it needs t o be authenticated. Next, a server_key_exchange message may be sent if it is req uired. This message is needed for certain public-key algorithms used for symmetr ic key exchange. Next, the server can request a public-key certificate from the client, using the certificate_request message. 15. Describe three alternative approaches to providing WAP end-to-end security. N/A

S-ar putea să vă placă și