v2.4.1 Login Get Started

Wireless Communication

Wireless Fidelity (Wi-Fi) is one of the most widely used wireless network technologies. A modem receives data from the internet and converts it into radio signals readable by Wi-Fi–enabled devices such as phones, tablets, and laptops. Wireless networking falls under the IEEE 802.11 standard — an extension of 802.3 (Ethernet) using radio waves instead of cables.

📅 Updated April 2026 Intermediate IEEE 802.11 ⏱️ 10 min read ✍️ K. Shrestha

Wi-Fi Basics

Wi-Fi operates in one of two radio frequency bands. A hotspot is the term for any device or location that can connect to Wi-Fi. Wireless channels work like TV channels — you tune into the correct channel by connecting to the right Wi-Fi SSID.

Band 1
📡 2.4 GHz

Frequency range: 2.412 – 2.484 GHz, divided into 14 channels spaced 5 MHz apart. Channels 1, 6, and 11 are most widely used as they do not overlap. Better range but slower data rates.

Band 2
⚡ 5.0 GHz

Frequency range: 4.915 – 5.825 GHz, divided into 42 channels of 10, 20, or 40 MHz each. Faster data rate but lower coverage than 2.4 GHz.

Channel selection tip

Routers often default to channel 6. In dense environments such as apartment buildings it may be difficult to manually assign channels to avoid overlap. Use a Wi-Fi analyser tool to identify the least congested channel.

CSMA/CA — Collision Avoidance

Unlike wired Ethernet's CSMA/CD (collision detection), Wi-Fi uses CSMA/CA (collision avoidance) because a wireless antenna cannot detect collisions while transmitting. CSMA/CA waits before transmitting and uses RTS/CTS (Request-to-Send / Clear-to-Send) handshaking. Each transmitting device advertises the time duration needed, informing other devices how long the medium will be unavailable.

Evolution of Wireless Networks

Cellular and Wi-Fi generations have advanced dramatically over five decades, enabling progressively higher data rates and new device capabilities.

Wireless network evolution by generation
Year Generation Max Speed Device Requirements
1981 1G Voice only — no data transfer
1991 2G Up to 40 kbps
1998 3G Up to 21 Mbps < 256 MB RAM, ≤ 16 GB storage
2008 4G / LTE Up to 1 Gbps < 6 GB RAM, ≤ 250 GB storage
2018 5G Up to 20 Gbps ≥ 8 GB RAM, > 512 GB storage

IEEE 802.11 Standards

Physical & Data Link Layers
🛜 IEEE 802.11 (WLAN)

Wireless communications fall under the IEEE 802.11 (WLAN) protocol family. These standards define the Physical and Data Link (MAC sublayer) layers for wireless LANs — the layers at which WLANs differ from wired LANs.

The MAC protocol differs from Ethernet (802.3) at the link layer because a wireless antenna cannot detect collisions while transmitting. When a collision occurs in Wi-Fi, devices hop to another channel. To avoid this, 802.11 uses CSMA/CA with RTS/CTS handshaking and explicit acknowledgements.

The Physical Layer modulates data according to the applicable standard and transmits bits as RF signals using unlicensed bands at 2.4 GHz and 5 GHz. Actual throughput is always lower than the rated speed due to environmental conditions.

Radio Spectrum
📻 ISM Bands

ISM bands (902–928 MHz, 2400–2483.5 MHz, 5.725–5.850 GHz) are internationally reserved portions of the radio spectrum, itself a part of the electromagnetic spectrum.

Originally reserved for Industrial, Scientific, and Medical applications (microwaves, medical equipment, industrial heaters), ISM bands are now also used by cordless phones, Bluetooth, Wi-Fi, wireless garage door openers, and many IoT devices using Zigbee technology (915 MHz and 2.4 GHz) for low-power, short-range communication.

No regulatory protection

Equipment operating on ISM bands must tolerate interference from ISM applications. Users have no regulatory protection from ISM device operation.

Wi-Fi Standard Versions

Wi-Fi 802.11 standards comparison
Standard Released Band Max Speed Key Feature
802.11a 1999 5 GHz 54 Mbps Requires more power; shorter indoor range.
802.11b 1999 2.4 GHz 11 Mbps Most widely accepted at launch due to low cost and good range. Superseded by 802.11g and 802.11n.
802.11g 2003 2.4 GHz 54 Mbps Backward compatible with 802.11b; suffers similar interference problems.
802.11n 2009 2.4 / 5 GHz 600 Mbps Introduces MIMO (Multiple-Input/Multiple-Output): separate antennas process multipath signals arriving slightly out of phase.
802.11ac 2013 5 GHz Up to 1 Gbps Up to 8 spatial streams; introduces MU-MIMO allowing APs to send data to multiple client stations simultaneously.
802.11ax (Wi-Fi 6) 2019 1 GHz – 7 GHz Up to 10 Gbps Supports MIMO and MU-MIMO; improved efficiency in dense environments; operates in additional frequency bands.

Wi-Fi Modes

Fixed topology
🏗️ Infrastructure Mode

Based on fixed geographic positions with dedicated devices — radio towers, switches, routers, buildings. Wi-Fi operating in infrastructure mode uses an Access Point (AP) as the central hub for all wireless clients.

Peer-to-peer / temporary
🔄 Ad Hoc Mode

Devices and users are mobile; there is no dedicated server. Every device can act as both server and client. Data travels device-to-device (similar to bus topology). Also called peer-to-peer mode.

Wireless Technology Range Categories

Different wireless technologies are suited to different ranges and data-rate requirements:

Short Range · Low Data Rate
Bluetooth, BLE (Bluetooth Low Energy), ZigBee. Used for personal devices, smart-home sensors, and wearables.
Cellular · High Data Rate
2G, 3G, LTE, 4G, 5G. Used for mobile internet and voice over wide geographic areas.
Long Range · Low Power (LPWAN)
LoRa, Sigfox, NB-IoT, Cat-M1. Low data rate but coverage exceeding 20 km. Ideal for IoT deployments such as agricultural sensors controlling irrigation systems.
Body / Personal Area (WBAN / WPAN — IEEE 802.15)
Short range of a few metres. Used in medical applications such as pacemakers, insulin pumps, and health monitors.

Other Ad Hoc Network Types

  • MANET — Mobile Ad Hoc Network of mobile devices.
  • VANET — Vehicular Ad Hoc Network; communication between vehicles; relevant to AI-driven autonomous systems.
  • SPAN — Smartphone Ad Hoc Network created via Wi-Fi or Bluetooth.
  • Wireless Mesh Network — Interconnected wireless access points that self-form a resilient network.
  • Balloon Network — Aerial Wi-Fi where no ground infrastructure exists; a balloon provides coverage.

Security

Wireless networks require robust security because radio signals can be intercepted by anyone within range. Security in Wi-Fi is configured through encryption on the Access Point (AP). Both horizontal (end-device to end-device) and vertical (layer-based) threat perspectives must be considered — every node in the network is a potential attack surface.

Authentication Framework

IEEE 802.1X
🔐 Port-Based Access Control

802.1X is an IEEE framework for port-based access control adopted by the 802.11i security workgroup to provide authenticated access to WLANs. Authentication between client and AP relies on the Extensible Authentication Protocol (EAP) and primarily a RADIUS server.

Open authentication and shared authentication are simpler but less secure alternatives to EAP.

Encryption Protocols

Legacy — Avoid
🔓 WEP — Wired Equivalent Privacy

The original Wi-Fi encryption protocol. Now considered completely broken and should never be used. Vulnerable to key-recovery attacks in minutes.

Legacy — Avoid
🔒 WPA / WPA2

Significant improvements over WEP. WPA2 uses CCMP/AES encryption and remains widely deployed. However, WPA2-Personal (PSK) is vulnerable to offline dictionary attacks if a weak passphrase is used.

Recommended — Current Standard
🛡️ WPA3 (2018)

The latest generation of Wi-Fi security, providing more recent protocols introduced in 2018. Key improvements over its predecessors:

  • Replaces PSK (128-bit pre-shared key) with SAE (Simultaneous Authentication of Equals), eliminating offline dictionary attacks.
  • Supports natural password selection — easier-to-remember passwords remain secure.
  • Provides forward secrecy — protects traffic even if a password is compromised after data was transmitted.
  • Automatically encrypts connections without requiring additional credentials.
  • Uses 256-bit GCMP-256 (Galois/Counter Mode Protocol) for data encryption.
  • Uses 192-bit minimum-strength security protocols and cryptographic tools for sensitive data.

Source: wi-fi.org/discover-wi-fi/security ↗

Convenience Feature
📲 WPS — Wi-Fi Protected Setup

WPS simplifies connecting devices to a wireless network without entering long passphrases. Methods include a physical push-button on the router/AP and a PIN method.

WPS PIN is vulnerable

The WPS PIN method is susceptible to brute-force attacks and should be disabled on routers unless actively needed. Use WPA3 SAE instead where possible.

Security Best Practices

  • Use WPA3 wherever hardware and clients support it; fall back to WPA2-AES only.
  • Disable WPS PIN method; push-button only is safer if WPS must be enabled.
  • Choose a strong, unique passphrase — WPA3 SAE makes short passwords more resistant to attack, but complexity still helps.
  • Enable 802.1X / RADIUS authentication for enterprise WLANs instead of PSK.
  • Treat every wireless node as a potential threat entry point — apply both horizontal and vertical security perspectives.