Skip to content
Feb 25

Wireless Networking and WiFi Standards

MT
Mindli Team

AI-Generated Content

Wireless Networking and WiFi Standards

Wireless networking has liberated devices from physical cables, enabling the mobile world we live in today. Understanding how it works at a technical level is crucial, not just for casual use, but for designing, troubleshooting, and securing modern networks that must contend with a shared, invisible, and often chaotic transmission medium.

The Wireless Medium and Its Inherent Challenges

Unlike a wired Ethernet cable that provides a clean, private communication channel, a Wireless LAN (WLAN) uses shared radio frequency (RF) waves. This introduces several unique physical and logical challenges that protocols must overcome.

First is the problem of the hidden terminal. Imagine two laptops (A and C) that are both within range of an access point (AP), but are too far apart to hear each other's transmissions. If both A and C try to send data to the AP at the same time, their signals will collide at the AP, corrupting the data. Neither laptop is aware of the other's transmission—they are "hidden" from each other. This collision problem is more complex than in wired networks because nodes cannot always detect collisions by listening.

Second, signal fading and attenuation weaken the radio wave as it travels. Fading can be caused by distance (path loss), by objects absorbing or reflecting the signal (shadowing), or by multiple copies of the signal arriving at the receiver at slightly different times due to reflections (multipath fading). This results in a constantly varying signal strength, which directly impacts data rate and reliability.

Finally, interference is a major issue. The wireless medium is shared not only with other WiFi networks but also with Bluetooth devices, microwave ovens, cordless phones, and any other device operating in the same frequency band (primarily 2.4 GHz and 5 GHz). This uncoordinated "noise" can corrupt data frames, forcing retransmissions and degrading overall network performance.

Medium Access: CSMA/CA and the RTS/CTS Handshake

To manage access to the shared wireless medium in a semi-orderly fashion, IEEE 802.11 uses a protocol called Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA). It is fundamentally different from the Collision Detection (CSMA/CD) used in classic Ethernet. Since a wireless node cannot reliably detect a collision while transmitting (its own transmission power overwhelms its ability to hear other signals), the protocol focuses on avoiding collisions in the first place.

Here is the simplified CSMA/CA process:

  1. Listen Before Talking: A station wanting to transmit first listens to the medium. If it is idle for a specific duration (called the DIFS), it proceeds. If busy, it waits for the medium to become idle and then enters a random backoff period.
  2. Random Backoff: The station chooses a random number of time slots to wait. This timer decreases only when the medium is idle. This randomization helps prevent multiple waiting stations from all transmitting at once after a busy period.
  3. Transmit: When the backoff timer reaches zero, the station transmits its data frame.
  4. Acknowledgment: For unicast frames, the receiving station must send an immediate Acknowledgement (ACK) frame. If the sender does not receive an ACK, it assumes a collision or error occurred and retries, doubling its backoff window (a process called exponential backoff).

To specifically mitigate the hidden terminal problem, an optional Request-to-Send/Clear-to-Send (RTS/CTS) handshake can be used. Before sending the main data frame, a station sends a short RTS control frame to the AP. The AP, which is within range of all associated stations, then broadcasts a CTS frame. This CTS frame acts as a broadcast announcement, effectively telling every station (including hidden ones), "I am expecting a transmission, remain silent for the following period." While RTS/CTS adds overhead, it is valuable for protecting large data frames in environments where hidden terminals are likely.

The Evolution of WiFi Security: WEP, WPA, WPA2, and WPA3

Wireless security has evolved dramatically in response to critical vulnerabilities in early protocols.

  • Wired Equivalent Privacy (WEP) was the original security protocol. It used the RC4 stream cipher with a static, shared key. Its fatal flaws were a small, reusable Initialization Vector (IV) and weak key integrity checks. An attacker capturing enough encrypted packets could easily deduce the key. WEP is now considered completely broken and must not be used.
  • WiFi Protected Access (WPA) was introduced as an interim fix. It retained the RC4 cipher but implemented the Temporal Key Integrity Protocol (TKIP), which dynamically per-packet keys and included a message integrity check. While a significant improvement over WEP, TKIP was later found to have vulnerabilities, and WPA is also now considered insecure.
  • WPA2 became the mandatory certification in 2006 and remains widespread. Its most important upgrade was mandating the use of the robust Advanced Encryption Standard (AES) block cipher with Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP). This provides strong confidentiality and data integrity. WPA2 operates in two modes: Personal (WPA2-PSK) uses a pre-shared key/passphrase, while Enterprise uses a RADIUS authentication server for individual user credentials (e.g., using 802.1X/EAP).
  • WPA3, the current standard, addresses remaining weaknesses. Key enhancements include Simultaneous Authentication of Equals (SAE), which replaces the WPA2-PSK handshake to protect against offline dictionary attacks, ensuring a complex passphrase is no longer critical for security. It also provides Forward Secrecy, meaning a compromised session key cannot be used to decrypt past sessions. For open/public networks, WPA3 encrypts individual user traffic even without a shared password.

Comparing WiFi Standards: 802.11a/b/g/n/ac/ax

WiFi standards, defined by the IEEE 802.11 working group, specify the physical layer (PHY) and media access control (MAC) layer technologies. Each new generation brings higher speeds, greater range, and improved efficiency.

  • 802.11a & 802.11b (1999): The first widely adopted standards. 802.11a operated in the cleaner 5 GHz band using Orthogonal Frequency-Division Multiplexing (OFDM), offering up to 54 Mbps. 802.11b operated in the crowded 2.4 GHz band using Direct-Sequence Spread Spectrum (DSSS), offering up to 11 Mbps. They were not compatible with each other.
  • 802.11g (2003): Brought OFDM to the 2.4 GHz band, offering 54 Mbps while maintaining backward compatibility with 802.11b devices (though at a performance cost when legacy devices were present).
  • 802.11n (WiFi 4, 2009): A major leap. It introduced Multiple-Input Multiple-Output (MIMO) technology, using multiple antennas to transmit and receive several spatial data streams simultaneously, dramatically increasing throughput. It operated in both 2.4 GHz and 5 GHz bands and supported channel bonding (combining two 20 MHz channels into a 40 MHz channel). Maximum theoretical link rates reached 600 Mbps.
  • 802.11ac (WiFi 5, 2013): Operated exclusively in the 5 GHz band. It expanded on 802.11n with wider channels (up to 160 MHz), more spatial streams (up to 8), and advanced modulation. Its key feature was Multi-User MIMO (MU-MIMO), allowing an AP to transmit to multiple clients simultaneously. Theoretical speeds exceeded 3 Gbps.
  • 802.11ax (WiFi 6/6E, 2019): Focuses on efficiency and performance in dense environments. It uses Orthogonal Frequency-Division Multiple Access (OFDMA), which subdivides a channel to serve multiple clients at once, reducing latency. It also introduces uplink MU-MIMO, better power management, and operates in 2.4 GHz, 5 GHz, and the new 6 GHz band (WiFi 6E). It is designed for capacity, not just peak speed.

Common Pitfalls

  1. Ignoring Non-WiFi Interference: Troubleshooting poor WiFi performance often focuses on other WiFi networks. However, significant interference can come from non-802.11 sources like Bluetooth, wireless cameras, or microwaves. Using a spectrum analyzer, not just a WiFi scanner, is essential for identifying these "noise floor" issues.
  2. Misunderstanding "Theoretical" Speeds: The headline speeds on a router box (e.g., "AX6000") are the sum of theoretical maximums across all bands and streams under perfect laboratory conditions. Real-world throughput is often 50-60% of the PHY rate due to protocol overhead, interference, and distance. Always plan for effective, not theoretical, bandwidth.
  3. Relying on Outdated Security Protocols: Using WEP or even WPA/TKIP for compatibility with old devices creates a critical vulnerability for the entire network. A network is only as strong as its weakest security protocol. Legacy devices should be upgraded or isolated, not accommodated with weak security.
  4. Overlooking the Hidden Terminal in Design: When deploying access points, it's easy to only consider coverage areas from the AP to clients. Engineers must also model whether clients at the edge of an AP's range can hear each other. Failure to account for hidden terminals can lead to unexplained collisions and poor performance that signal strength alone cannot diagnose.

Summary

  • Wireless networks operate over a shared, unreliable medium characterized by challenges like the hidden terminal problem, signal fading, and interference from both WiFi and non-WiFi sources.
  • CSMA/CA is the core access method, using random backoffs and acknowledgements to avoid collisions, with the optional RTS/CTS handshake solving hidden terminal issues.
  • WiFi security has evolved from the broken WEP, to interim WPA, to the robust WPA2 (using AES-CCMP), and now to WPA3 which provides forward secrecy and protects against offline attacks.
  • Modern standards like 802.11ax (WiFi 6) prioritize network efficiency and capacity in dense environments using technologies like OFDMA and MU-MIMO, building upon the speed foundations laid by earlier standards like 802.11n and ac.
  • Effective wireless engineering requires a practical understanding of real-world performance limits, a commitment to modern security, and diagnostic techniques that look beyond simple signal strength.

Write better notes with AI

Mindli helps you capture, organize, and master any subject with AI-powered summaries and flashcards.