WIRELESS LOGIC (ENG)
📢IMPORTANT: True growth comes from questioning, not agreeing. I invite you to challenge my views in the comments. Let's learn from debate, not from echo chambers.
In a previous document, we saw how the wireless transmission works, so this time we need to go deep into the logic.
BASIC CONCEPTS
First, the IEEE defined the 802.11 standard, and several companies formed the Wi-Fi Alliance to develop devices compatible with it.
802.11 WLANs operate in half-duplex mode, meaning devices cannot transmit and listen simultaneously, nor can they do so when another device is using the channel. To avoid collisions, CSMA/CA (Collision Avoidance Mode) is used. This protocol checks if the medium is free; if it is, it waits a random amount of time and listens again; if it remains free, it transmits the data.
To establish these connections, we need a Basic Service Set (BSS). The BSS is a concept based on the 802.11 standard that includes, at its core, at least one access point and a client device connected to the access point.
This BSS needs a unique identifier to distinguish it from other BSSs. For this, we use the BSSID (Basic Service Set Identifier), which is the MAC address of the access point's (AP) radio.
This identifier is used for devices, but we also need another human-readable identifier to select the network we want to connect to. This is the Service Set Identifier (SSID), and it's the name of the wireless network we can select from our client device. We can configure multiple SSIDs on the same access point and link each SSID to a different VLAN. When a client connects to the SSID, the access point sends that client's traffic with an 802.1q tag to the distribution network. This means that the link between the access point and the wired network must be a backbone link.
The coverage area of the access point is called the Basic Service Area (BSA). This is the area that the radio waves from our access point can cover.
This is the wireless network we usually have at home, with an access point (usually included in the internet provider's router).
CONNECTING CLIENTS
Discover
Before attempting any connection, our client device needs to know which networks are available. This can be done in two ways:
These frames send information about the BSS, such as BSSID, security, channel, SSID, etc. With this information, our devices can begin connecting to the APs.
Authentication
In this step, the device presents itself to the AP and requests open system authentication.
Open System Authentication is a method to enter the Access Point and start presenting the credentials. This is not a negotiation of credentials; it is only the permission to ingress to the AP, and in most modern wireless networks is only a formality.
Association
Following this, the device sends a partnership request, which is a list of its capabilities. The access point can accept and send its own capabilities. The lower-level capabilities are what define the connection.
At this point, the client is accepted at the access point and can initiate the four-way handshake to verify the password. This process varies depending on the password type, as we will see in a future document.
SCALING THE NETWORK
Now imagine what happens if we need to cover a large area, such as in a business. We would need more access points to reach all the spaces. If we use different SSIDs for each access point, our client device would have to negotiate the connection with each one as it crosses different zones, which could severely affect real-time connections, such as VoIP, streaming, etc. To solve this, we have an Extended Service Set (ESS) with an Extended Service Set Identifier (ESSID). This resolves the problem of sharing the SSID between access points. To know which access point it is connected to, the client device uses the BSSID.
ROAMING ON LAYER 2
The Extended Services Suite (ESS) requires a concept called roaming. In this case, it's Layer 2 roaming, which allows the client to connect to a nearby access point without interruption. Imagine you're walking down a large hallway; to cover this area, we might use two or three access points with the same SSID. In this scenario, if you're on a video call, you need a stable connection on the other side of the hallway; this is what roaming provides.
After this document, we will analyze client association in more detail, but to understand how roaming works, the device connects to the nearest AP, and when the device hears a stronger signal with the same SSID, it sends a re-association request, and if the AP approves it, the client connects to the new AP.
ROAMING ON LAYER 3
Roaming can also operate at Layer 3; it's more complex, but the function is the same: to keep the device connected.
How does it work? Imagine a campus with two buildings, each with its own network, but both sharing a central management system for their wireless devices (a wireless LAN controller). To maintain wireless network consistency between the buildings, we have the same SSID, called "MY_NETWORK," but in Building 1, the SSID is linked to VLAN 10, and in Building 2, to VLAN 20. This presents a problem because, although Layer 2 roaming allows the device to remain connected, its IP address doesn't match the VLAN of Building 2's network.
If the device had to renegotiate its IP address, this could cause service interruptions due to DHCP negotiation. To avoid this, the central administrator uses a concept called "Mobility Anchor."
The WLC is set as the device session anchor point with the IP address of VLAN 10. When the device attempts to connect to AP2, it sends traffic to the WLC, which identifies the device's IP address and creates a tunnel to send the traffic to VLAN 10. This way, even if the device is connected to AP2, it will have an IP address in VLAN 10.
FAST ROAMING
Before discussing roaming, it's worth mentioning that it allows you to connect to an ESS (Electrical Service Provider) without service interruptions. However, this can sometimes be complicated, so to optimize it, we have special standards called Fast Roaming.
For an optimal experience, it is recommended that the devices (AP and client) support all three standards.
WIRELESS ARCHITECTURES
There are two main topologies for wireless networks: Standalone and Split-MAC.
Each architecture has different operating modes; a table summarizing them is shown below.
This topology is divided into three subcategories. Before going into detail, it's necessary to understand a device (and a concept) called a WLC (Wireless LAN Controller) and another called a LAP (Lightweight Access Point).
LAPs are access points without management capabilities, which can only be configured from a WLC.
The main function of the WLC is to manage the LAPs, allowing us to connect to all the LAPs on our network and modify their configuration. WLCs have a graphical user interface (GUI) that provides information about our LAPs and the clients connected to them. It functions as a control center for all our wireless networks. Let's now look at the three subcategories.
Recommended by LinkedIn
This topology uses CAPWAP tunnels to manage the LAPs. It is similar to a VPN between the WLC and the LAP, and has two tunnel usage modes: Flexconnect Mode and Centralized Mode.
LAP CONNECTION TO WLC
When we connect a LAP to our network for the first time, it must establish a connection with its wireless LAN controller (WLC). To do this, the LAP uses several methods:
After discovering the WLC, the LAP must establish the CAPWAP tunnel to secure the connection.
💡The CAPWAP tunnel uses UDP port 5246 for management traffic and UDP port 5247 for data traffic.
All these topologies can also have different connection modes; here are some of those:
Autonomous Architecture Modes
Split MAC Architecture Modes (CLOUD-BASED)
Split MAC Architecture Modes (WLC)
WIRELESS CAPABILITIES
The 802.11 standard is not a fixed rule; it evolves over time, adapting to new technologies, and, of course, this evolution leads to changes in the standard's name. These evolutions are defined by different acronyms. We can divide them into two categories based on their characteristics: Legacy and Modern.
Legacy
Modern