Professional Documents
Culture Documents
04/19/2024
BSIT-3H NAC32
Pioneered the 5 GHz frequency band, offering less interference compared to the crowded 2.4
GHz spectrum.
Employed Orthogonal Frequency Division Multiplexing (OFDM), a modulation scheme that
delivers high data rates (up to 54 Mbps).
Its higher frequency resulted in slightly reduced range compared to the soon-to-follow 802.11b.
802.11b (1999):
Reintroduced OFDM on the 2.4 GHz band, offering speeds comparable to 802.11a.
Assured backward compatibility with legacy 802.11b devices, solidifying its market dominance.
802.11n (2009):
Designed for dense network environments, it operates in the 2.4 GHz, 5 GHz, and newly opened
6 GHz bands.
Employs Orthogonal Frequency-Division Multiple Access (OFDMA), a refined resource sharing
technique for better efficiency in multi-device situations
Improved MU-MIMO and spatial reuse mechanisms further optimize network capacity.
Impact of IEEE 802.11 Standards
Speed Revolution: Each standard brought substantial gains in data rates, transforming user
experience. From basic web browsing to real-time applications like 4K/8K video streaming, high-
bandwidth online gaming, and augmented/virtual reality have become possible.
Capacity and Connectivity: Innovations like MIMO and MU-MIMO have propelled a surge in the
number of devices a Wi-Fi network can efficiently support, crucial in today's connected homes
and IoT landscapes.
Reliability and Range: While early standards had coverage limitations, advancements in
modulation schemes, beamforming, and interference mitigation have significantly improved
range and signal stability.
Challenges and Future Directions
Spectrum Demand: The quest for faster speeds highlights the need for additional spectrum. The 6
GHz band opened by 802.11ax is a step, but continued innovation is needed.
Security: Security is a continuous concern, driving stronger encryption and authentication in
subsequent standards.
Future Standards: IEEE 802.11be (Extremely High Throughput) is on the horizon, targeting even
higher data rates and further lowering latency.
CSMA/CA
Operation: In CSMA/CA, a device senses the channel for activity. If the channel is idle for a specified
time (DIFS), it may transmit. If the channel is busy, it defers and applies a random backoff time before
another attempt, reducing collision probability (Bianchi, 2000).
Strengths:
TDMA
Operation: A central node or distributed synchronization dictates the allocation of timeslots. Devices
transmit only in their assigned slots (Ramanathan, 1997).
Strengths:
Wi-Fi Multimedia (WMM): WMM enables traffic prioritization based on four Access Categories
(ACs): Voice (highest priority), Video, Best Effort, and Background (lowest priority). WMM
helps prioritize time-sensitive traffic and provides a basic level of QoS differentiation (Cisco,
2020).
Traffic Specification (TSPEC): TSPEC allows applications to express their QoS requirements
explicitly in terms of parameters such as bandwidth, latency, and jitter. The network then
attempts to reserve resources and manage traffic flows accordingly (Li et. al, 2021).
Enhanced Distributed Channel Access (EDCA): EDCA modifies the channel access mechanisms
of Wi-Fi to provide priority-based access to different traffic categories. This results in lower
contention and reduced latency for higher priority traffic flows (He et al., 2018).
Sucgang, Richard L. 04/19/2024
BSIT-3H NAC32
Analysis of common security threats in Wi-Fi networks and the security measures
employed to safeguard network integrity, including encryption (WPA2, WPA3) and
authentication protocols.
Wireless networks (Wi-Fi) underpin a significant portion of contemporary network infrastructure. While
offering flexibility and mobility, Wi-Fi networks introduce unique security vulnerabilities. Understanding
these threats and the countermeasures in place is crucial to maintaining the privacy and security of
sensitive data. This research delves into prevalent Wi-Fi security risks, analyzes encryption and
authentication protocols, and outlines Wi-Fi-supported network services.
Common Wi-Fi Security Threats
Weak Passwords: Simple or predictable passwords open the door for brute-force attacks, where
attackers systematically try numerous password combinations (Norton, 2022).
Man-in-the-Middle (MitM) Attacks: These attacks occur when cybercriminals position
themselves between a user's device and the Wi-Fi access point. They can intercept and modify
traffic, stealing confidential information (Kaspersky, 2023).
Rogue Access Points: These are unauthorized wireless access points set up to lure unsuspecting
users. Cybercriminals use them to eavesdrop on traffic or launch attacks (Cisco, 2021).
Denial-of-Service (DoS) Attacks: Aiming to disrupt network operations, DoS attacks bombard a
Wi-Fi network with overwhelming traffic, rendering it inaccessible for legitimate users
(Cloudflare, n.d.).
Sucgang, Richard L. 04/19/2024
BSIT-3H NAC32
Security Measures
Encryption Protocols
o Wi-Fi Protected Access 2 (WPA2): A widespread security protocol, WPA2 provides
robust encryption using the Advanced Encryption Standard (AES). Despite demonstrated
vulnerabilities, it remains a strong defense against numerous attacks (Wi-Fi Alliance,
2023).
o Wi-Fi Protected Access 3 (WPA3): The WPA3 standard enhances security by
introducing stronger encryption algorithms, improved password protection, and resistance
to offline dictionary attacks (Wi-Fi Alliance, 2023).
Authentication Protocols
o Extensible Authentication Protocol (EAP): EAP is a flexible framework for
authenticating network users. EAP supports various authentication methods, such as
EAP-TLS, which relies on digital certificates for robust security (Somasundaram &
Mathur, 2018).
Web Browsing and Communication: Wi-Fi provides the backbone for web browsing, email,
social media, and instant messaging. These services generally have low bandwidth demands but
place a premium on reliability and responsiveness (Tutorialspoint, 2023).
Sucgang, Richard L. 04/19/2024
BSIT-3H NAC32
File Sharing: Transferring files between devices on a Wi-Fi network is commonplace. File size
and desired transfer speed influence network demands in this use case (Now Corporation, 2023).
Streaming Media: Music and video streaming have become increasingly dependent on Wi-Fi.
High bandwidth and low latency are vital for ensuring buffer-free and high-quality streaming
experiences (Now Corporation, 2023).
Voice over IP (VoIP): Wi-Fi supports VoIP calls for personal and business use. These are real-
time services prioritizing low latency, jitter, and reliable connectivity (Investopedia, 2023).
Online Gaming: Wi-Fi enables multiplayer gaming, with low latency and packet loss being
critical to smooth gameplay. QoS mechanisms help manage traffic and improve gaming
experiences (Investopedia, 2023).
Smart Home and IoT: Wi-Fi powers a growing ecosystem of smart home and Internet of Things
(IoT) devices. Requirements vary based on the device and applications, but security
considerations are paramount (Tutorialspoint, 2023).
Bandwidth: Sufficient bandwidth accommodates the aggregate data rates required for all
connected devices and services (Now Corporation, 2023).
Latency: Low latency is essential for real-time applications like VoIP and online gaming. High
latency introduces delays and negatively impacts user experience (Now Corporation, 2023).
Quality of Service (QoS): QoS mechanisms allow prioritization of certain traffic types (e.g.,
video calls) over others, ensuring critical services perform optimally even under network
congestion(Investopedia, 2023).
Security: Robust security protocols, including encryption and strong passwords, safeguard data
confidentiality and integrity against unauthorized access and cyberattacks (Tutorialspoint, 2023).
Challenges and Solutions
Interference: Wi-Fi signals can be disrupted by other devices operating in the same frequency
bands. Mitigating solutions involve channel optimization and switching to less crowded
frequencies (Tutorialspoint, 2023).
Coverage: Optimizing access point placement and potentially using mesh systems ensure
comprehensive coverage.
Spectrum Congestion
Spectrum congestion occurs when too many Wi-Fi networks and devices operate within the same limited
radio frequency spectrum. The unlicensed 2.4 GHz and 5 GHz bands used by Wi-Fi are becoming
increasingly crowded. Congestion results in slower speeds, dropped connections, and unreliable network
performance (Digital Trends, 2023).
Sucgang, Richard L. 04/19/2024
BSIT-3H NAC32
Potential Solutions
Wi-Fi 6 and Wi-Fi 6E: Newer Wi-Fi standards, like Wi-Fi 6 and Wi-Fi 6E, use technologies
such as OFDMA (Orthogonal Frequency-Division Multiple Access) to improve spectrum
efficiency, better handle simultaneous device connections, and reduce congestion (Digital Trends,
2023).
6 GHz Band Expansion: The opening of the 6 GHz band for Wi-Fi use offers a significant
increase in spectrum, reducing congestion and enabling faster speeds in Wi-Fi 6E devices
(CNET, 2023).
Signal Interference
Wi-Fi signals can be obstructed and degraded by other devices and physical objects. Common sources of
interference include microwaves, Bluetooth devices, and walls or floors, which weaken signal strength
and reduce network coverage (Tutorialspoint, 2023).
Potential Solutions
Channel Selection: Manually selecting less crowded Wi-Fi channels or using routers that
automate this process can reduce signal overlap and interference (CNET, 2023).
Device Placement: Optimized router and device placement away from sources of interference
can improve signal quality (CORE Articles, 2023).
Mesh Wi-Fi Systems: Mesh Wi-Fi systems extend coverage, reducing the impact of obstacles by
using multiple nodes (Digital Trends, 2023).
Security Vulnerabilities
Wi-Fi networks are susceptible to security threats like hacking, unauthorized access, and interception of
sensitive data. Some common security concerns include weak passwords, outdated firmware, and
inadequate encryption protocols (Tutorialspoint, 2023).
Potential Solutions
Strong Passwords: Implement WPA2 or WPA3 encryption with complex passwords that
combine letters, numbers, and symbols.
Regular Updates: Keep devices and routers updated with the latest security patches to address
vulnerabilities (Digital Trends, 2023).
Firewalls and Security Software: Employ firewalls and antivirus/anti-malware software for
network and device protection (CORE Articles, 2023).
Sucgang, Richard L. 04/19/2024
BSIT-3H NAC32
References:
Bianchi, G. (2000). Performance analysis of the IEEE 802.11 distributed coordination function. IEEE
Journal on Selected areas in Communications, 18(3), 535-547.
Goldsmith, A. (2005). Wireless communications. Cambridge University Press.
Ramanathan, S. (1997). A unified framework and algorithm for channel assignment in wireless networks.
Wireless Networks, 3(2), 81-94.
Rappaport, T. S. (2001). Wireless communications: principles and practice. Prentice Hall PTR.
Somasundaram, K., & Mathur, G. (2018). Network security using EAP with RADIUS. International
Journal of Computer Applications, 179(42), 39-43.
IEEE 802.11. (2020). IEEE Standard for Information technology—Telecommunications and information
exchange between systems Local and metropolitan area networks—Specific requirements Part 11:
Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications.
Wi-Fi Alliance. (2023). Security. https://www.wi-fi.org/discover-wi-fi/security
CNET. (2023). The most common Wi-Fi problems and how to fix them.
https://www.cnet.com/home/internet/common-wi-fi-problems-and-how-to-fix-them/
Cloudflare. (n.d.). What is a DoS attack? [invalid URL removed]
Cisco. (2021). What is a rogue access point? [invalid URL removed]
CORE Articles. (2023). Common wireless network issues. https://corecabling.com/common-wireless-
network-issues/
Digital Trends. (2023). Wi-Fi not working? How to fix the most common problems.
https://www.digitaltrends.com/computing/wi-fi-problems-and-solutions/
Investopedia. (2023). Internet service provider (ISP): What they do and examples.
https://www.investopedia.com/terms/i/isp.asp
Kaspersky (2023). What is a man-in-the-middle attack? [invalid URL removed]
Now Corporation. (2023). Guaranteed wireless internet. https://now-corp.com/services/guaranteed-
wireless-internet/
Norton (2022). 10 Wi-Fi security tips. [invalid URL removed]
Tutorialspoint. (2023). Wi-Fi - Network services.
https://www.tutorialspoint.com/wi-fi/wifi_network_services.htm
Tutorialspoint. (2023). Wi-Fi – major issues. https://www.tutorialspoint.com/wi-fi/wifi_major_issues.htm