Wireless Communication
Wireless Fidelity (Wi-Fi) is one of the most widely used wireless network technologies. A modem receives data from the internet and converts it into radio signals readable by Wi-Fi–enabled devices such as phones, tablets, and laptops. Wireless networking falls under the IEEE 802.11 standard — an extension of 802.3 (Ethernet) using radio waves instead of cables.
Wi-Fi Basics
Wi-Fi operates in one of two radio frequency bands. A hotspot is the term for any device or location that can connect to Wi-Fi. Wireless channels work like TV channels — you tune into the correct channel by connecting to the right Wi-Fi SSID.
Frequency range: 2.412 – 2.484 GHz, divided into 14 channels spaced 5 MHz apart. Channels 1, 6, and 11 are most widely used as they do not overlap. Better range but slower data rates.
Frequency range: 4.915 – 5.825 GHz, divided into 42 channels of 10, 20, or 40 MHz each. Faster data rate but lower coverage than 2.4 GHz.
Routers often default to channel 6. In dense environments such as apartment buildings it may be difficult to manually assign channels to avoid overlap. Use a Wi-Fi analyser tool to identify the least congested channel.
Unlike wired Ethernet's CSMA/CD (collision detection), Wi-Fi uses CSMA/CA (collision avoidance) because a wireless antenna cannot detect collisions while transmitting. CSMA/CA waits before transmitting and uses RTS/CTS (Request-to-Send / Clear-to-Send) handshaking. Each transmitting device advertises the time duration needed, informing other devices how long the medium will be unavailable.
Evolution of Wireless Networks
Cellular and Wi-Fi generations have advanced dramatically over five decades, enabling progressively higher data rates and new device capabilities.
| Year | Generation | Max Speed | Device Requirements |
|---|---|---|---|
| 1981 | 1G | Voice only — no data transfer | — |
| 1991 | 2G | Up to 40 kbps | — |
| 1998 | 3G | Up to 21 Mbps | < 256 MB RAM, ≤ 16 GB storage |
| 2008 | 4G / LTE | Up to 1 Gbps | < 6 GB RAM, ≤ 250 GB storage |
| 2018 | 5G | Up to 20 Gbps | ≥ 8 GB RAM, > 512 GB storage |
IEEE 802.11 Standards
Wireless communications fall under the IEEE 802.11 (WLAN) protocol family. These standards define the Physical and Data Link (MAC sublayer) layers for wireless LANs — the layers at which WLANs differ from wired LANs.
The MAC protocol differs from Ethernet (802.3) at the link layer because a wireless antenna cannot detect collisions while transmitting. When a collision occurs in Wi-Fi, devices hop to another channel. To avoid this, 802.11 uses CSMA/CA with RTS/CTS handshaking and explicit acknowledgements.
The Physical Layer modulates data according to the applicable standard and transmits bits as RF signals using unlicensed bands at 2.4 GHz and 5 GHz. Actual throughput is always lower than the rated speed due to environmental conditions.
ISM bands (902–928 MHz, 2400–2483.5 MHz, 5.725–5.850 GHz) are internationally reserved portions of the radio spectrum, itself a part of the electromagnetic spectrum.
Originally reserved for Industrial, Scientific, and Medical applications (microwaves, medical equipment, industrial heaters), ISM bands are now also used by cordless phones, Bluetooth, Wi-Fi, wireless garage door openers, and many IoT devices using Zigbee technology (915 MHz and 2.4 GHz) for low-power, short-range communication.
Equipment operating on ISM bands must tolerate interference from ISM applications. Users have no regulatory protection from ISM device operation.
Wi-Fi Standard Versions
| Standard | Released | Band | Max Speed | Key Feature |
|---|---|---|---|---|
| 802.11a | 1999 | 5 GHz | 54 Mbps | Requires more power; shorter indoor range. |
| 802.11b | 1999 | 2.4 GHz | 11 Mbps | Most widely accepted at launch due to low cost and good range. Superseded by 802.11g and 802.11n. |
| 802.11g | 2003 | 2.4 GHz | 54 Mbps | Backward compatible with 802.11b; suffers similar interference problems. |
| 802.11n | 2009 | 2.4 / 5 GHz | 600 Mbps | Introduces MIMO (Multiple-Input/Multiple-Output): separate antennas process multipath signals arriving slightly out of phase. |
| 802.11ac | 2013 | 5 GHz | Up to 1 Gbps | Up to 8 spatial streams; introduces MU-MIMO allowing APs to send data to multiple client stations simultaneously. |
| 802.11ax (Wi-Fi 6) | 2019 | 1 GHz – 7 GHz | Up to 10 Gbps | Supports MIMO and MU-MIMO; improved efficiency in dense environments; operates in additional frequency bands. |
Wi-Fi Modes
Based on fixed geographic positions with dedicated devices — radio towers, switches, routers, buildings. Wi-Fi operating in infrastructure mode uses an Access Point (AP) as the central hub for all wireless clients.
Devices and users are mobile; there is no dedicated server. Every device can act as both server and client. Data travels device-to-device (similar to bus topology). Also called peer-to-peer mode.
Wireless Technology Range Categories
Different wireless technologies are suited to different ranges and data-rate requirements:
- Short Range · Low Data Rate
- Bluetooth, BLE (Bluetooth Low Energy), ZigBee. Used for personal devices, smart-home sensors, and wearables.
- Cellular · High Data Rate
- 2G, 3G, LTE, 4G, 5G. Used for mobile internet and voice over wide geographic areas.
- Long Range · Low Power (LPWAN)
- LoRa, Sigfox, NB-IoT, Cat-M1. Low data rate but coverage exceeding 20 km. Ideal for IoT deployments such as agricultural sensors controlling irrigation systems.
- Body / Personal Area (WBAN / WPAN — IEEE 802.15)
- Short range of a few metres. Used in medical applications such as pacemakers, insulin pumps, and health monitors.
Other Ad Hoc Network Types
- MANET — Mobile Ad Hoc Network of mobile devices.
- VANET — Vehicular Ad Hoc Network; communication between vehicles; relevant to AI-driven autonomous systems.
- SPAN — Smartphone Ad Hoc Network created via Wi-Fi or Bluetooth.
- Wireless Mesh Network — Interconnected wireless access points that self-form a resilient network.
- Balloon Network — Aerial Wi-Fi where no ground infrastructure exists; a balloon provides coverage.
Security
Wireless networks require robust security because radio signals can be intercepted by anyone within range. Security in Wi-Fi is configured through encryption on the Access Point (AP). Both horizontal (end-device to end-device) and vertical (layer-based) threat perspectives must be considered — every node in the network is a potential attack surface.
Authentication Framework
802.1X is an IEEE framework for port-based access control adopted by the 802.11i security workgroup to provide authenticated access to WLANs. Authentication between client and AP relies on the Extensible Authentication Protocol (EAP) and primarily a RADIUS server.
Open authentication and shared authentication are simpler but less secure alternatives to EAP.
Encryption Protocols
The original Wi-Fi encryption protocol. Now considered completely broken and should never be used. Vulnerable to key-recovery attacks in minutes.
Significant improvements over WEP. WPA2 uses CCMP/AES encryption and remains widely deployed. However, WPA2-Personal (PSK) is vulnerable to offline dictionary attacks if a weak passphrase is used.
The latest generation of Wi-Fi security, providing more recent protocols introduced in 2018. Key improvements over its predecessors:
- Replaces PSK (128-bit pre-shared key) with SAE (Simultaneous Authentication of Equals), eliminating offline dictionary attacks.
- Supports natural password selection — easier-to-remember passwords remain secure.
- Provides forward secrecy — protects traffic even if a password is compromised after data was transmitted.
- Automatically encrypts connections without requiring additional credentials.
- Uses 256-bit GCMP-256 (Galois/Counter Mode Protocol) for data encryption.
- Uses 192-bit minimum-strength security protocols and cryptographic tools for sensitive data.
WPS simplifies connecting devices to a wireless network without entering long passphrases. Methods include a physical push-button on the router/AP and a PIN method.
The WPS PIN method is susceptible to brute-force attacks and should be disabled on routers unless actively needed. Use WPA3 SAE instead where possible.
Security Best Practices
- Use WPA3 wherever hardware and clients support it; fall back to WPA2-AES only.
- Disable WPS PIN method; push-button only is safer if WPS must be enabled.
- Choose a strong, unique passphrase — WPA3 SAE makes short passwords more resistant to attack, but complexity still helps.
- Enable 802.1X / RADIUS authentication for enterprise WLANs instead of PSK.
- Treat every wireless node as a potential threat entry point — apply both horizontal and vertical security perspectives.