You are on page 1of 29

WLAN WIFI

PROJECT
(WLAN WIFI)

PRESENTED BY:

1. M.USMAN BSIT51F21S076
2. MANAHIL FATIMA BSIT51F21R040
3. SUNBAL NAWAZ BSIT51F21R007
4. ARSLAN ALI BSIT51F21S092
5. SHUJA HAIDER BSIT51F21S080

PRESENTED TO:

SIR FAROOQ JAVED


SUBJECT:

MOBILE &WIRELESS NETWORKS

UNIVERSITOF SARGHODHA
WLAN WIFI

WLAN-Wi-Fi
INTRODUCTION: -

WLAN stands for Wireless Local Area Network, and Wi-Fi, which stands for Wireless
Fidelity, is a common technology used to create WLANs. A WLAN is a type of network that
allows devices to communicate wirelessly within a limited area, typically within a home, office,
or public hotspot. Wi-Fi utilizes radio waves to transmit data between devices, such as
computers, smartphones, tablets, and other network-enabled devices.
Key components of a WLAN/WIFI setup include:-

Access Point (AP)


Wireless Router
Wireless Network Interface Card (NIC)
Service Set Identifier (SSI)
Encryption

Ubiquity Of Wi-Fi:-
Wi-Fi ubiquity spans homes, businesses, and public spaces, enabling seamless
connectivity worldwide. It powers our digital lifestyles, facilitating communication,
entertainment, and productivity. From streaming movies to conducting business meetings, Wi-Fi
has become indispensable. Its widespread availability revolutionizes how we live, work, and
interact in the modern age.

Essential Connectivity:-
Essential connectivity bridges distances, enabling instant communication and
information access globally. It empowers individuals, businesses, and communities, fostering
collaboration and innovation. From remote work to medicine, essential connectivity ensures
continuity and efficiency in various domains. As a fundamental component of modern life, it
underpins progress, resilience, and disconnectedness. Rich History:-

Wi-Fi rich history traces back to the 1990s when it emerged as a solution for wireless
networking. Its roots lie in research conducted by IEEE, leading to the development of the
802.11 standard. Over the years, Wi-Fi evolved from providing limited connectivity to becoming
a ubiquitous technology powering the digital age. Its journey reflects continuous innovation,
standards advancement, and widespread adoption, shaping the modern world's connectivity
landscape.
WLAN WIFI

Impact On Daily Life:-


Wi-Fi impact on daily life is profound, enabling constant connectivity in homes,
workplaces, and beyond. From streaming entertainment to remote work and online shopping, it
revolutionizes how we live, work, and play. It facilitates seamless communication, collaboration,
and access to information, enhancing productivity and convenience. In essence, Wi-Fi has
become an indispensable tool, shaping the way we navigate and interact in our modern,
interconnected world.

Introduction to Wireless Ad Hoc Mode:

 Wireless ad hoc mode, also known as ad hoc networking or peer-to-peer networking,


refers to a decentralized type of wireless network architecture where devices
communicate directly with each other without the need for a centralized access point or
infrastructure. In this mode, each device in the network acts both as a transmitter and a
receiver, allowing for dynamic and self-configuring connections among devices within
range.
 Decentralized Communication: Unlike traditional wireless networks, which rely on a
centralized access point to coordinate communication between devices, wireless ad hoc
mode enables direct peer-to-peer communication among devices within range. Each
device in the network can communicate with any other device without relying on a fixed
infrastructure.
 Dynamic Formation: Adhoc networks are formed dynamically as devices come into
range of each other. When two or more devices discover each other, they can establish
a temporary network connection to exchange data, share resources, or collaborate on
tasks.

 Flexibility and Mobility: Ad hoc networks are highly flexible and adaptable to changing
conditions. Devices can join or leave the network at any time, and the network topology
adjusts dynamically to accommodate changes in device availability or connectivity. This
makes ad hoc networks particularly suitable for mobile or temporary deployments
where fixed infrastructure is impractical or unavailable.
 Self-Configuration: Ad hoc networks typically employ distributed algorithms and
protocols to enable self-configuration and self-organization among network devices.
Devices cooperate to discover and establish connections, route data packets, and
maintain network stability without centralized control.
 Applications: Wireless ad hoc mode finds applications in various scenarios, including
military communications, emergency response situations, collaborative environments,
WLAN WIFI

sensor networks, and Internet of Things (IoT) deployments. Ad hoc networks enable
communication and collaboration among devices in situations where traditional
infrastructure-based networks are unavailable or unreliable.
 Challenges: Despite their advantages, ad hoc networks face challenges such as limited
scalability, network security concerns, susceptibility to interference and signal
degradation, and the need for efficient routing algorithms to ensure reliable
communication in dynamic and often resource-constrained environments.
 Standards and Protocols: Several wireless networking standards, such as IEEE 802.11
(Wi-Fi) and IEEE 802.15 (Bluetooth), support ad hoc mode operation. Additionally, ad
hoc networking protocols such as Ad hoc On-Demand Distance Vector (AODV) and
Dynamic Source Routing (DSR) are commonly used to enable routing and
communication in ad hoc networks.

Characteristics of WLAN WiFi Adhoc Mode:

Wireless Local Area Network (WLAN) Wi-Fi ad hoc mode, also known as Independent Basic
Service Set (IBSS) mode, possesses several key characteristics that distinguish it from traditional
infrastructure-based WLANs. Here are the primary characteristics of WLAN Wi-Fi ad hoc mode:

 Decentralized Infrastructure: Unlike infrastructure mode WLANs, which rely on a central


access point (AP) to coordinate communication between devices, ad hoc mode operates
in a decentralized manner. Devices communicate directly with each other without the
need for a central AP, forming a peer-to-peer network.
 Peer-to-Peer Communication: In ad hoc mode, each device in the network can act both
as a client and as an access point, enabling peer-to-peer communication. Devices can
transmit data directly to other devices within their transmission range without
intermediaries.
 Dynamic Network Formation: Ad hoc networks are formed dynamically as devices come
into range of each other. Devices can join or leave the network at any time, and the
network topology adjusts dynamically to accommodate changes in device connectivity.
 Self-Configuring: Ad hoc networks employ distributed algorithms and protocols to
enable self-configuration and self-organization among network devices. Devices
cooperate to discover and establish connections, negotiate network parameters, and
maintain network stability without centralized control.
 Limited Range: Ad hoc networks typically have a limited transmission range compared
to infrastructure mode WLANs. The range is determined by the transmit power of the
devices and environmental factors such as obstacles and interference.
WLAN WIFI

 Scalability Challenges: Ad hoc networks may face scalability challenges as the number of
devices increases. Routing and communication overheads can increase with network
size, potentially impacting performance and efficiency.
 Security Considerations: Ad hoc networks are susceptible to security vulnerabilities such
as eavesdropping, spoofing, and unauthorized access due to the lack of a central
authority for authentication and encryption. Implementing robust security measures
such as encryption protocols (e.g., WPA2-PSK) and authentication mechanisms (e.g.,
pre-shared keys) is essential to mitigate security risks.
 Resource Sharing: Ad hoc networks facilitate resource sharing among devices within the
network. Devices can share files, printers, internet access, and other resources without
the need for a centralized server or infrastructure.
 Dynamic Routing: Ad hoc networks employ dynamic routing protocols such as Ad hoc
On-Demand Distance Vector (AODV) and Dynamic Source Routing (DSR) to establish and
maintain communication paths between devices. These protocols adapt to changing
network conditions and route data packets efficiently.

Applications Of WLAN Wi-Fi Adhoc Mode:

 Emergency Response and Disaster Recovery: In emergency situations such as


natural disasters or infrastructure failures, traditional communication networks
may be disrupted. Wi-Fi ad hoc networks enable first responders and emergency
personnel to quickly establish communication and coordinate relief efforts
without relying on centralized infrastructure.
 Military and Defense: Ad hoc networks are widely used in military and defense
applications where secure and resilient communication is essential. Soldiers
deployed in remote locations can form ad hoc networks using portable devices
to exchange information, share intelligence, and coordinate tactical operations.
 Outdoor Events and Festivals: Ad hoc networks are deployed at outdoor events,
festivals, and concerts where temporary communication infrastructure is needed.
Attendees can connect their smartphones, tablets, and other devices to form ad
hoc networks for sharing updates, accessing event information, and staying
connected with friends.
 Remote Rural Areas: Ad hoc networks are deployed in remote rural areas where
traditional infrastructure-based Wi-Fi networks are not feasible due to
geographical constraints or lack of resources. Villages, farms, and remote
communities can establish ad hoc networks to facilitate communication, access
information, and share resources among residents.
WLAN WIFI

 Peer-to-Peer File Sharing: Ad hoc networks enable peer-to-peer file sharing


among devices without the need for internet connectivity or centralized servers.
Users can connect their devices directly to share files, documents, music, and
multimedia content with each other.
 Collaborative Work Environments: Ad hoc networks are used in collaborative
work environments such as classrooms, conference rooms, and project teams.
Participants can quickly form ad hoc networks to share presentations,
collaborate on documents, and exchange ideas without relying on external
network infrastructure.
 Educational and Research Projects: Ad hoc networks are used in educational
settings and research projects to study network protocols, routing algorithms,
and wireless communication technologies. Students and researchers can
experiment with ad hoc networks to understand their characteristics,
performance, and limitations.

Random Walk Indoor Mobility Model:


The Random Walk Indoor Mobility Model is a simulation model used to mimic the
movement patterns of mobile users within an indoor environment. In this model,
mobile users move randomly within the designated indoor space, simulating real-world
scenarios where users may change their location unpredictably.
Characteristics:

 Random Movement: Mobile users move randomly within the indoor


environment, without following any predefined patterns or trajectories. This
randomness reflects the unpredictable nature of human movement in crowded
indoor spaces.
 Spatial Constraints: Movement is confined within the boundaries of the indoor
environment, which may include rooms, corridors, hallways, and other enclosed
spaces. Users cannot move outside these boundaries.
 Variable Speeds: Users may move at variable speeds, reflecting differences in
walking speeds, stopping to interact with objects or people, or pausing at certain
locations.
 Direction Changes: Users can change direction abruptly, simulating changes in
walking paths, turning corners, or navigating obstacles within the indoor space.
 Interactions with Objects: Users may interact with objects within the indoor
environment, such as furniture, equipment, or stationary devices. These
interactions can affect movement patterns and user behavior.
WLAN WIFI

 Temporal Dynamics: Movement patterns may vary over time, reflecting changes
in user behavior, crowd dynamics, or environmental conditions within the indoor
space.

Applications:

Network Performance Evaluation: The Random Walk Indoor Mobility Model is


used to evaluate the performance of WLAN Wi-Fi ad hoc networks in indoor
environments. By simulating realistic user mobility patterns, researchers can
assess factors such as network coverage, connectivity, throughput, and latency
under varying conditions.
Resource Allocation: Understanding user mobility patterns helps optimize
resource allocation in WLAN Wi-Fi ad hoc networks. By analyzing user movement
and location data, network resources such as bandwidth, channel access, and
transmission power can be dynamically allocated to improve network efficiency
and quality of service.
Routing Protocol Evaluation: The model is used to evaluate the effectiveness of
routing protocols in ad hoc networks under realistic indoor mobility scenarios. By
simulating user movement and communication patterns, researchers can assess
the performance of routing protocols in terms of packet delivery ratio, end-to-
end delay, and routing overhead.
Location-Based Services: The model is utilized to develop and test location-based
services and applications within indoor environments. By simulating user
movement and location data, developers can design and optimize applications
such as indoor navigation, asset tracking, proximity-based advertising, and
location-based information services.
Security Analysis: Understanding user mobility patterns is essential for assessing
the security vulnerabilities of WLAN Wi-Fi ad hoc networks in indoor
environments. By simulating user movement and communication behaviors,
researchers can identify potential security threats such as eavesdropping,
spoofing, denial-of-service attacks, and unauthorized access.
WLAN WIFI

Modes of Wi-Fi
The 802.11 standard defines two operating modes:
1. Infrastructure mode, in which wireless clients are connected to an access point. This
is generally the default mode for 802.11b cards.
2. Ad hoc mode, in which clients are connected to one another without any access
point.

 Introduction
Infrastructure mode is one of the primary operational modes in wireless local area
networks (WLANs), such as Wi-Fi networks. In infrastructure mode, wireless
communication is facilitated through central devices called Access Points (APs). These
APs act as bridges between wireless client devices and the wired network infrastructure,
enabling seamless connectivity and communication between wireless devices and
resources on the wired network.

 Basic Components

 Access Points (APs) are central devices in infrastructure mode WLANs that
facilitate wireless communication between client devices and the wired network.
APs are typically connected to the wired network infrastructure via Ethernet
cables. They broadcast wireless signals, known as beacons, to announce the
presence of the WLAN and provide a means for client devices to connect. APs
manage the communication between client devices and the wired network,
including routing data packets to and from client devices and performing
authentication and encryption functions.

 Clients refer to wireless devices that connect to the WLAN through Access
Points. Common client devices include laptops, smartphones, tablets, IOT
devices, and other Wi-Fi-enabled devices. Clients communicate with APs using
Wi-Fi radio signals, adhering to IEEE 802.11 standards. They send data packets to
APs for transmission over the wireless network and receive data packets from
APs destined for them. Clients may roam between different APs within the
WLAN WIFI

WLAN coverage area while maintaining network connectivity, enabling mobility


and flexibility for users.

 Roaming
When a roaming user goes from one BSS to another while moving within the ESS,
his or her machine's wireless network adapter is able to switch access points
depending on the quality of the signal it receives from different access points.
Access points communicate with one another using a distribution system in
order to trade information about the stations and, if necessary, to transmit data
from mobile stations. This feature which lets stations move "transparently" from
one access point to another is called roaming.
WLAN WIFI

 Working of Wi-Fi

 Association:
When a client device wants to join a WLAN in infrastructure mode, it performs a
process called association. During association, the client device scans for
available APs broadcasting the network's Service Set Identifier (SSID) and selects
an appropriate AP to connect to based on signal strength, security settings, and
other criteria. The client device then sends an association request to the selected
AP, requesting permission to join the WLAN.

 Authentication and Security:


Upon receiving the association request, the AP authenticates the client device to
verify its identity and authorize network access. Authentication methods such as
Open System Authentication, Shared Key Authentication, or more secure
methods like WPA/WPA2 with 802.1X/EAP may be used depending on network
security settings. Once authentication is successful, the AP establishes a secure
connection with the client device using encryption protocols to protect data
transmitted over the wireless link.
WLAN WIFI

 Data Transmission:
After successful association and authentication, the client device can
communicate with other devices on the WLAN and access network resources.
Data transmitted by the client device is sent to the AP, which forwards it to the
appropriate destination on the wired network. Similarly, data from the wired
network destined for the client device is sent to the AP, which then forwards it
wirelessly to the client device.

 Routing and Forwarding:


APs in infrastructure mode perform routing and forwarding functions to ensure
that data packets are delivered to their intended destinations. APs maintain
tables of MAC addresses and IP addresses of connected devices to route packets
efficiently within the WLAN and between the WLAN and the wired network.

 Management and Control:


APs in infrastructure mode are typically managed centrally using network
management software or controllers. Centralized management allows
administrators to configure AP settings, monitor network performance,
troubleshoot connectivity issues, and enforce security policies across all APs in
the WLAN.

 Advantages

 Scalability:
Infrastructure mode WLANs are highly scalable, allowing organizations to expand
their wireless network coverage by deploying additional Access Points (APs) as
needed. As the number of wireless devices and users grows, more APs can be
added to accommodate the increased demand for connectivity.
Scalability enables organizations to adapt their WLAN infrastructure to changing
requirements and ensure consistent coverage across larger areas without
sacrificing performance or reliability.

 Centralized Management:
Infrastructure mode facilitates centralized management of WLAN infrastructure
through network management software or controllers.
Centralized management provides administrators with a unified interface to
configure, monitor, and troubleshoot all APs within the WLAN. Administrators
WLAN WIFI

can centrally manage AP settings, update firmware, enforce security policies, and
monitor network performance from a single dashboard, streamlining
administrative tasks and reducing management overhead.

 Enhanced Security:
Infrastructure mode WLANs offer enhanced security features compared to ad-
hoc or peer-to-peer wireless networks. APs in infrastructure mode support
advanced security mechanisms such as Wi-Fi Protected Access (WPA/WPA2)
encryption, 802.1X/EAP authentication, and guest access controls.
Centralized authentication and encryption ensure that only authorized users and
devices can access the network, protecting against unauthorized access, data
interception, and other security threats.

 Improved Performance:
Infrastructure mode WLANs typically deliver better performance compared to
ad-hoc networks due to centralized management and optimized network
configurations. APs in infrastructure mode coordinate channel assignments,
manage interference, and optimize data transmission to maximize throughput
and minimize latency.
Centralized management enables administrators to monitor network
performance metrics, identify performance bottlenecks, and implement
optimizations to improve overall WLAN performance and user experience.

 Limitations

 Single Point of Failure:


Infrastructure mode WLANs rely on Access Points (APs) as central devices for
connecting wireless clients to the network. If an AP fails or experiences issues, it
can disrupt connectivity for all client devices associated with that AP, leading to
network downtime and potential productivity losses. To mitigate the risk of a
single point of failure, redundant APs or failover mechanisms may be
implemented, but these solutions can add complexity and cost to the WLAN
deployment.

 Limited Mobility:
In infrastructure mode WLANs, client devices are typically associated with a
specific AP within the network coverage area. While clients can roam between
WLAN WIFI

different APs within the coverage area, their mobility is limited to the range of
the APs.
Client devices may experience connectivity issues or signal degradation when
moving between coverage areas of different APs, especially in areas with
overlapping coverage or areas with physical obstacles.

 Cost Considerations:
Deploying and maintaining infrastructure mode WLANs can incur significant
costs, including the purchase of APs, network switches, cabling infrastructure,
and network management software or controllers. Additional costs may be
incurred for site surveys, installation, configuration, and ongoing maintenance of
WLAN infrastructure.
The total cost of ownership (TCO) for infrastructure mode WLANs may be higher
compared to alternative wireless networking solutions, such as ad-hoc networks
or mesh networks, especially for large-scale deployments or organizations with
budget constraints.

 Dependency on Wired Infrastructure:


Infrastructure mode WLANs depend on a wired network infrastructure to
provide connectivity between APs and the rest of the network. APs must be
connected to Ethernet switches or routers via Ethernet cables, limiting their
placement and coverage area to areas with wired network access.
The dependency on wired infrastructure can increase deployment complexity,
installation costs, and maintenance overhead, especially in environments where
running Ethernet cables is challenging or impractical.

 Infrastructure mode

In mode infrastructure, each station computer (STA for short) connects to an


access point via a wireless link.
The set-up formed by the access point and the stations located within its
coverage area are called the basic service set, or BSS for short. They form one
cell. Each BSS is identified by a BSSID, a 6-byte (48-bite) identifier. In
infrastructure mode, the BSSID corresponds to the access point's MAC
address.
WLAN WIFI

It is possible to link several access points together (or more precisely several
BSS's) using a connection called a distribution system (DS for short) in order to
form an extended service set or ESS. The distribution system can also be a wired
network, a cable between two access points or even a wireless network.
An ESS is identified with an ESSID (Extended Service Set Identifier), a 32-
character identifier (in ASCII format) which acts as its name on the network. The
ESSID, often shortened to SSID, shows the network's name, and in a way acts a
first-level security measure, since it is necessary for a station to know the SSID in
order to connect to the extended network.

 Communicating with the access point

 When a station joins a cell, the cell sends a probe request on each channel. This
request contains the ESSID that the cell is configured to use, as well as the traffic
volume that its wireless adapter can support.
 If no ESSID is set, the station listens to the network for an SSID.
WLAN WIFI

 Each access point broadcasts at regular intervals (about ten times a second) a
signal called a beacon, which gives information on its BSSID, its characteristics,
and, if applicable, its ESSID.
 The ESSID is automatically broadcast by default, but it is possible (and
recommended) to disable this option. Whenever a probe request is received, the
access point checks the ESSID and the traffic volume request found in the beacon.
 If the given ESSID matches that of the access point, the acces point sends a
response containing synchronization data and information on its traffic load.
 This way, the station that receives the response can check the quality of the
signal being sent by the access point in order to determine how far away it is.
 Generally speaking, the closer an access point is, the higher its data transfer
capacity is.
 So, a station within range of multiple access points (which have the same SSID)
may choose the access point offering the best balance of capacity and current
traffic load.

 Examples:

Home Networks
Business and Office Environments
Public Wi-Fi Hotspots
Educational Institutions
Enterprise Networks

 Protocols and standards


Protocols and standards play a crucial role in the infrastructure mode of WLAN (Wi-Fi)
networks, ensuring interoperability, compatibility, and efficient operation.
WLAN WIFI

 IEEE 802.11 Family:


The IEEE 802.11 family of standards defines the specifications for wireless LANs,
including the infrastructure mode of operation.

The primary standards within the 802.11 family include:

a) 802.11a/b/g/n/ac/ax: These standards specify different generations of


Wi-Fi technology, each offering improvements in data rates, range, and
reliability.
b) 802.11n (Wi-Fi 4): Introduced Multiple Input Multiple Output (MIMO)
technology, significantly increasing data rates and improving network
performance compared to earlier standards.
c) 802.11ac (Wi-Fi 5): Introduced wider channels and higher-order
modulation techniques, enabling even higher data rates and better
performance, especially in crowded environments.
d) 802.11ax (Wi-Fi 6): The latest standard, designed to deliver higher
throughput, lower latency, and improved efficiency in high-density
environments with a large number of connected devices.

 Wi-Fi Alliance Standards:


The Wi-Fi Alliance is a nonprofit organization that certifies Wi-Fi products for
interoperability and compliance with industry standards.
Wi-Fi Alliance standards complement IEEE 802.11 standards and often include
additional features and optimizations. Some notable Wi-Fi Alliance standards
include:
Wi-Fi Protected Access (WPA/WPA2/WPA3): Security standards that provide
authentication and encryption mechanisms to secure wireless networks against
unauthorized access and data interception.
Wi-Fi Multimedia (WMM): A QoS protocol that prioritizes different types of
traffic (e.g., voice, video, data) to ensure optimal performance for time-sensitive
applications.
Wi-Fi Certified Easy Connect: A standard that simplifies the process of
connecting IoT devices to Wi-Fi networks securely using smartphone-based
setup methods.

 Data Transmission Protocols:


WLAN WIFI

In infrastructure mode WLANs, data transmission over the wireless network


typically relies on standard TCP/IP protocols for communication between devices
and network services.
TCP/IP protocols include TCP (Transmission Control Protocol) and UDP (User
Datagram Protocol), which facilitate reliable data transmission and packet
delivery over the network.

 Network Management Protocols:


Various network management protocols are used to monitor, configure, and
manage WLAN infrastructure components.
Examples of network management protocols include Simple Network
Management Protocol (SNMP), which provides a standardized framework for
managing network devices, and Dynamic Host Configuration Protocol (DHCP),
which assigns IP addresses and network configuration parameters to client
devices dynamically.

 Authentication and Security

 Authentication:
Authentication is the process of verifying the identity of devices attempting to
connect to a Wi-Fi network. In infrastructure mode, various authentication
methods are employed to ensure that only authorized users and devices gain
access to the network.

 Ways of Authentication

 Open System Authentication: This is the simplest form of authentication where


the client device associates with the Access Point (AP) without providing any
credentials. However, it does not provide any security against unauthorized
access and is susceptible to eavesdropping.
WLAN WIFI

 Shared Key Authentication: In this method, a pre-shared key (PSK) is configured


on both the AP and the client devices. The client device sends the key to the AP
during the authentication process, and if the key matches, the client is granted
access. While this method provides a basic level of security, the PSK can be
vulnerable to brute-force attacks if not sufficiently complex.

 Wi-Fi Protected Access (WPA/WPA2): WPA and WPA2 are Wi-Fi security
protocols that use stronger encryption and authentication mechanisms
compared to shared key authentication. They support various authentication
methods, including Pre-Shared Key (PSK) and 802.1X/EAP-based authentication.
WLAN WIFI

WPA2 is currently the most widely used Wi-Fi security protocol and provides
robust protection against unauthorized access and data interception.

 Extensible Authentication Protocol (EAP): EAP is an authentication framework


that allows for more advanced authentication methods beyond simple
username/password or PSK-based authentication. It enables the use of digital
certificates, smart cards, and other authentication mechanisms to verify the
identity of users or devices connecting to the network.
WLAN WIFI

 802.1X Authentication: 802.1X is an IEEE standard that provides port-based


network access control, allowing for centralized authentication of devices
connecting to the network. It works in conjunction with EAP to facilitate secure
authentication and dynamic key distribution, enhancing network security in

enterprise environm
 Security

 Security mechanisms in infrastructure mode Wi-Fi networks are designed to


protect against unauthorized access, eavesdropping, and data interception.

 Encryption: Encryption algorithms such as Advanced Encryption Standard (AES)


are used to secure data transmitted over the wireless network, preventing
unauthorized users from intercepting and deciphering the information.

 Authentication and Authorization: Authentication mechanisms ensure that only


authorized users and devices are granted access to the network, while
authorization controls determine the level of access granted to authenticated
users based on their credentials and privileges.

 Intrusion Detection and Prevention: Intrusion detection systems (IDS) and


intrusion prevention systems (IPS) are deployed to monitor network traffic for
suspicious activity and mitigate potential security threats in real-time.

 Network Segmentation: Segmentation of the network into separate virtual LANs


(VLANs) or subnets helps contain security breaches and limit the impact of
WLAN WIFI

potential attacks by isolating sensitive data and devices from the rest of the
network.

 Regular Security Audits and Updates: Regular security audits and firmware
updates are essential to identify and patch vulnerabilities in network
infrastructure, ensuring that security measures remain effective against evolving
threats.

 Future trends and development

 Wi-Fi 6 (802.11ax):
Wi-Fi 6, also known as 802.11ax, is the latest generation of Wi-Fi technology
designed to deliver higher data rates, improved performance, and better
efficiency compared to previous standards.
It introduces features such as orthogonal frequency-division multiple access
(OFDMA), multi-user multiple input, multiple output (MU-MIMO), and target
wake time (TWT) to enhance spectrum utilization and support more concurrent
users with higher throughput.
Wi-Fi 6 is particularly beneficial in dense environments like stadiums, airports,
and urban areas where multiple devices are competing for network access.

 Mesh Networking
Mesh networking technology enables the creation of robust, self-healing
wireless networks by allowing APs to communicate with each other directly,
forming a mesh topology.
Mesh networks improve coverage and reliability by extending the wireless
network's reach and providing redundancy, making them suitable for large-scale
deployments and environments with challenging coverage requirements.
WLAN WIFI

This technology is increasingly used in smart homes, outdoor deployments, and


enterprise environments to ensure seamless connectivity across the entire
network.

 IOT Integration
The proliferation of Internet of Things (IoT) devices is driving the integration of
Wi-Fi infrastructure with IoT ecosystems.
Wi-Fi networks are evolving to support the diverse connectivity needs of IoT
devices, including low-power devices, real-time communication, and secure data
transmission.
Advanced authentication mechanisms and network segmentation techniques are
being implemented to accommodate the security and scalability requirements of
IoT deployments.

 Security Enhancements
WLAN WIFI

With the increasing prevalence of cyber threats and security breaches, there is a
growing emphasis on enhancing the security of Wi-Fi networks.
Future developments in Wi-Fi security include the adoption of stronger
encryption algorithms, improved authentication methods, and enhanced
intrusion detection and prevention mechanisms.
Technologies such as Wi-Fi Protected Access 3 (WPA3), certificate-based
authentication, and secure boot mechanisms are being introduced to address
emerging security challenges and protect sensitive data transmitted over Wi-Fi
networks.

Versions of WIFI and Their Features Parameters of


Differentiation

 From WIFI-1 to WIFI-4:


Wi-Fi 1
Parameter (802.11b) Wi-Fi 2 (802.11a) Wi-Fi 3 (802.11g) Wi-Fi 4 (802.11n)
Maximum
Speed Up to 11 Mbps Up to 54 Mbps Up to 54 Mbps Up to 600 Mbps
Frequency
Bands 2.4 GHz 5 GHz 2.4 GHz 2.4 GHz, 5 GHz
Channel
Bandwidth 22 MHz 20 MHz 20 MHz Up to 40 MHz
Backward Not applicable Not applicable Compatible with Compatible with
WLAN WIFI

Wi-Fi 1
Parameter (802.11b) Wi-Fi 2 (802.11a) Wi-Fi 3 (802.11g) Wi-Fi 4 (802.11n)
Compatibility 802.11b 802.11b/g
OFDM OFDM
DSSS (Direct (Orthogonal OFDM (Orthogonal (Orthogonal
Modulation Sequence Spread Frequency Division Frequency Division Frequency Division
Technique Spectrum) Multiplexing) Multiplexing) Multiplexing)
MU-MIMO Not supported Not supported Not supported Not supported
MIMO Not applicable Not applicable Not applicable Up to 4x4
802.11
Standards IEEE 802.11b IEEE 802.11a IEEE 802.11g IEEE 802.11n
QoS (Quality Standard QoS
of Service) Not standardized Not standardized Basic QoS support support
WEP (Wired
WEP (Wired Equivalent Privacy),
Equivalent WEP (Wired WPA2/WPA3 in
Security Privacy) Equivalent Privacy) some cases WPA2/WPA3
Widely supported Limited support,
in devices mainly in Widely supported in Widely supported
Device released after enterprise-grade devices released in devices released
Support 1999 devices after 2003 after 2009

 WIFI-5 to Onward:
Parameter Wi-Fi 5 (802.11ac) Wi-Fi 6 (802.11ax) Wi-Fi 6E (802.11ax)
Maximum Up to 3.5 Gbps (with Up to 9.6 Gbps (with Up to 9.6 Gbps (with
Speed Wave 2) AX600) AX600)
Frequency 6 GHz (in addition to 2.4
Bands 5 GHz 2.4 GHz, 5 GHz GHz, 5 GHz)
Channel
Bandwidth Up to 160 MHz Up to 160 MHz Up to 160 MHz
Backward Compatible with Compatible with Compatible with
Compatibility 802.11a/n 802.11a/b/g/n 802.11a/b/g/n/ac
OFDM (Orthogonal OFDMA (Orthogonal OFDMA (Orthogonal
Modulation Frequency Division Frequency Division Frequency Division Multiple
Technique Multiplexing) Multiple Access) Access)
MU-MIMO Supported Supported Supported
MIMO Up to 8x8 Up to 8x8 Up to 8x8
WLAN WIFI

Parameter Wi-Fi 5 (802.11ac) Wi-Fi 6 (802.11ax) Wi-Fi 6E (802.11ax)


802.11
Standards IEEE 802.11ac IEEE 802.11ax IEEE 802.11ax
Enhanced QoS support Enhanced QoS support
QoS (Quality of Enhanced QoS support (OFDMA, BSS Coloring, (OFDMA, BSS Coloring,
Service) (Airtime Fairness, etc.) etc.) etc.)
Security WPA2/WPA3 WPA3/WPA3 Enterprise WPA3/WPA3 Enterprise
Widely supported in Increasing support in
devices released after devices released after Increasing support in
Device Support 2013 2019 devices released after 2020

Important Defines:

 Modulation Techniques:
1. Direct Sequence Spread Spectrum (DSSS):
- DSSS spreads the signal across a wider bandwidth using a spreading code.
- Purpose: It enhances the reliability of the communication by adding redundancy to
the transmitted signal, making it more resistant to interference and noise.

2. Orthogonal Frequency Division Multiplexing (OFDM):


- OFDM divides the available spectrum into multiple sub-channels and transmits data
simultaneously across these sub-channels.
- Purpose: It improves data throughput and reliability by mitigating the effects of
multipath interference and frequency-selective fading.

3. Orthogonal Frequency Division Multiple Access (OFDMA):


- OFDMA extends the principles of OFDM to allow multiple users to share the same
frequency resources simultaneously.
- Purpose: It enables more efficient spectrum utilization by allocating subchannels to
different users dynamically, thereby increasing network capacity and improving
performance, especially in crowded environments.
WLAN WIFI

Security Standards

1. Wired Equivalent Privacy (WEP):


- WEP was the first security protocol introduced for Wi-Fi networks.
- Definition: It provides basic encryption for wireless data over the network using static
keys. However, WEP is now considered weak and vulnerable to various attacks.

2. Wi-Fi Protected Access (WPA):


- WPA was developed to address the shortcomings of WEP and enhance wireless
security.
- Definition: WPA employs stronger encryption algorithms and dynamic keys,
improving the confidentiality and integrity of data transmitted over Wi-Fi networks.
WPA2 is an enhanced version of WPA and is widely used today.

3. WPA3:
- WPA3 is the latest security protocol for Wi-Fi networks, offering improved security
features over WPA2.
- Definition: WPA3 introduces stronger encryption algorithms, enhanced protection
against brute-force attacks, and better security for open networks. It provides
individualized encryption for each device connected to the network, enhancing overall
security.

4. WPA3 Enterprise:
- WPA3 Enterprise is designed for use in corporate and enterprise environments.
- Definition: It provides additional security features such as mutual authentication,
which ensures that both the client device and the access point authenticate each other
before establishing a connection. WPA3 Enterprise also supports stronger encryption
protocols for enterprise-grade security.
WLAN WIFI

These modulation techniques and security standards play crucial roles in ensuring the
reliability, efficiency, and security of Wi-Fi networks, thereby enabling seamless wireless
communication.

Parameters
1. Maximum Speed:
- This refers to the theoretical maximum data transfer rate that the Wi-Fi standard can
support under ideal conditions.
- It indicates the peak speed at which data can be transmitted over the wireless
network.

2. Frequency Bands:
- Wi-Fi operates in two main frequency bands: 2.4 GHz and 5 GHz.
- The 2.4 GHz band offers better range and penetration through obstacles but may
suffer from more interference due to its widespread use by other devices like Bluetooth
devices, microwaves, and cordless phones.
- The 5 GHz band typically provides higher data rates and is less congested but has a
shorter range and may experience more attenuation through walls and other
obstructions.

3. Channel Bandwidth:
- Channel bandwidth refers to the width of the frequency range allocated to transmit
data.
- It determines how much data can be transmitted at once.
- Wider channel bandwidth allows for higher data rates but may suffer from more
interference.

4. Backward Compatibility:
- Backward compatibility indicates whether a newer Wi-Fi standard can communicate
with devices using older Wi-Fi standards.
- It ensures that newer devices can still connect and communicate with older devices
on the network.
WLAN WIFI

5. Modulation Technique:
- Modulation techniques define how data is encoded and transmitted over the
wireless channel.
- Different modulation techniques are used in different Wi-Fi standards to improve
data transmission efficiency and reliability.

6. MU-MIMO (Multi-User Multiple Input Multiple Output):


- MU-MIMO allows multiple devices to communicate simultaneously with a Wi-Fi
router or access point.
- It improves network efficiency by serving multiple clients at the same time, rather
than sequentially.

7. MIMO (Multiple Input Multiple Output):


- MIMO technology uses multiple antennas at both the transmitter and receiver to improve
communication performance.
- It increases data throughput and enhances signal coverage by transmitting multiple
data streams simultaneously.

8. 802.11 Standards:
- The IEEE 802.11 standards define the specifications for wireless LANs, including Wi-Fi.
- Each Wi-Fi standard is identified by a letter and number combination (e.g., 802.11n,
802.11ac) and specifies various aspects such as frequency bands, data rates, and
modulation techniques.

9. QoS (Quality of Service):


- QoS refers to the ability of a Wi-Fi network to prioritize certain types of traffic over
others.
- It ensures that critical applications like video streaming or online gaming receive
sufficient bandwidth and latency requirements for optimal performance.
WLAN WIFI

10. Security:
- Security mechanisms such as WEP (Wired Equivalent Privacy), WPA (Wi-Fi Protected
Access), and WPA3 are used to protect Wi-Fi networks from unauthorized access and
data interception.
- Each Wi-Fi standard may introduce improvements in security features to address
vulnerabilities discovered in previous standards.

11. Device Support:


- Device support indicates the availability and compatibility of devices with a specific
Wi-Fi standard.
- Newer Wi-Fi standards may require hardware upgrades in both routers/access
points and client devices to take advantage of their features and performance
enhancements.

You might also like