Wireless Network
Wireless Network
A wireless network consists of various components, each playing a crucial role in the setup.
The main elements include wireless routers, access points, and network adapters.
• Wireless routers, the network's central devices, manage the network and provide internet
access to connected devices.
• Access points extend the wireless signal to cover larger areas or multiple floors, ensuring
comprehensive network coverage.
• Wireless network adapters enable devices to connect to the network, allowing them to
access the Internet and network resources seamlessly.
• Wireless antennas
wireless architecture
Ad hoc mode: By using ad hoc mode, all devices in the wireless network are directly
communicating with each other in peer to peer communication mode (point-topoint). The
network has no structure or fixed points. No access point is required for communication
between devices.
Infrastructure mode: All devices are connected to wireless network with the help of an
access point (AP). The infrastructure mode provides improved security, ease of
management, and much more scalability and stability. However, the infrastructure mode
incurs extra cost in deploying access points such as routers or switches.
Wireless Network Standards
The networking standard used by wireless architecture is IEEE 802.11. However, this standard is in continual
development and new amendments come out regularly. Amendments to the standard are assigned letters, and
while many amendments have been released, the most commonly known are:
802.11a:This original amendment added support for the 5 GHz band, allowing transmission up to 54 megabits of
data per second. The 802.11a standard makes use of orthogonal frequency-division multiplexing (OFDM). It splits
the radio signal into sub-signals before they get to a receiver. 802.11a is an older standard and has been largely
replaced by newer technology.
802.11b:802.11b added faster rates in the 2.4GHz band to the original standard. It can pass up to 11 megabits of
data in a second. It uses complementary code keying (CCK) modulation to achieve better speeds. 802.11b is an
older standard and has been largely replaced by newer technology.
802.11g:802.11g standardized the use of OFDM technology used in 802.11a in the 2.4GHz band. It was
backwards compatible with both 802.11 and 802.11b. 802.11g is an older standard and has been largely replaced
by newer technology.
802.11n:Once the most popular standard 802.11n was the first time a unified specification covered both the
2.4GHz and 5GHz bands. This protocol offers better speed when compared to those that came before it by
leveraging the idea of transmitting using multiple antennas simultaneously (usually called Multiple In Multiple Out
or MIMO technology). 802.11n is an older standard, but some older devices may still be found in use.
Wireless Security
WEP:WEP (Wired Equivalent Privacy) was first security solutions for WLANs that
employed encryption. WEP uses a static 64-bit key, where the key is 40 bits long,
and a 24-bit initialization vector (IV) is used. IV is sent in clear-text. Because WEP
uses RC4 as an encryption algorithm and the IV is sent in clear-text, WEP can be
broken. To alleviate this problem, the key was extended to 104 bits with the IV
value. However, either variation can easily be broken in minutes on laptops and
computers produced today.
802.1x EAP:The Extensible Authentication Protocol (EAP) is a layer 2 process that
allows a wireless client to authenticate to the network. There are two varieties of
EAP: one for wireless and one for LAN connections, commonly called EAP over LAN
(EAPoL).One of the concerns in wireless is allowing a WLAN client to communicate
to devices behind an AP. Three standards define this process: EAP, 802.1x, and
Remote Authentication Dial In User Service (RADIUS). EAP defines a standard way
of encapsulating authentication information, such as a username and password or
a digital certificate that the AP can use to authenticate the user.802.1x and RADIUS
define how to packetize the EAP information to move it across the network.
WPA:Wi-Fi Protected Access (WPA) was designed by the Wi-Fi Alliance as a
temporary security solution to provide for the use of 802.1x and enhancements
in the use of WEP until the 802.11i standard would be ratified. WPA can operate
in two modes: personal and enterprise mode. Personal mode was designed for
home or SOHO usage. A pre-shared key is used for authentication, requiring you
to configure the same key on the clients and the AP. With this mode, no
authentication server is necessary as it is in the official 802.1 x standards.
Enterprise mode is meant for large companies, where an authentication server
will centralize the authentication credentials of the clients.
WPA2:WPA2 is the IEEE 802.11i implementation from the Wi-Fi Alliance. Instead
of using WEP, which uses the weak RC4 encryption algorithm, the much more
secure Advanced Encryption Standard (AES)–counter mode CBC-MAC Protocol
(CCMP) algorithm is used.
WPA3: The latest standard, offering enhanced security features and protection
against brute-force attacks.
Wireless network operations
Frame control field: This field includes information about the type of
frame (management, control, or data), as well as information about the
frame's transmission and reception.
Duration field: This field indicates the duration of time that the wireless
medium will be occupied for the transmission of the current frame and
any subsequent frames.
MAC address fields: This field includes the MAC addresses of the source
and destination devices.
Sequence control field: This field includes a sequence number that is
used to ensure that frames are received in the correct order.
Frame body: This field includes the actual data being transmitted.
Frame check sequence (FCS) field: This field is used to check the
integrity of the transmitted frame.
Types of control frames and their functions
• Request to Send (RTS): The RTS frame is used by a device to request permission to
transmit data to another device. The RTS frame includes the duration of time the
requesting device intends to transmit and the destination MAC address.
• Clear to Send (CTS): The CTS frame is sent by the destination device in response to
an RTS frame, granting permission for the requesting device to transmit data. The
CTS frame also includes the duration of time the destination device intends to occupy
the wireless medium.
• Acknowledgement (ACK): The ACK frame is used to acknowledge the receipt of a
data frame. The sending device waits for an ACK frame before sending the next
frame, ensuring that frames are received correctly.
• Power Save Poll (PS-Poll): The PS-Poll frame is used by a wireless station in power-
saving mode to request buffered frames from an access point.
• Beacon: The Beacon frame is sent periodically by an access point to advertise the
presence of a wireless network and provide information about the network's
capabilities.
Types of frames used in wireless communication
Data Frames: Data frames are used to carry data between wireless devices in a wireless
local area network (WLAN). They contain the actual data being transmitted, along with
control information such as the source and destination MAC addresses, sequence
numbers, and error-checking codes.
Control Frames: Control frames are used to manage access to the wireless medium,
negotiate data rates, and handle errors in the wireless network. They include frames such
as Request to Send (RTS), Clear to Send (CTS), and Acknowledgement (ACK) frames.
Management Frames: Management frames are used to manage and control the wireless
network itself, rather than transmitting data. They include frames such as Beacon, Probe
Request, and Probe Response frames, which are used for network discovery and
management.
Null Data Frames: Null data frames are used to reserve the wireless medium when no
actual data is being transmitted. They are sent periodically by wireless devices to prevent
other devices from transmitting on the same channel.
Association and Disassociation Frames: Association and disassociation frames are used to
connect and disconnect wireless devices from the wireless network. They include frames
such as Association Request, Association Response, Disassociation, and Reassociation
frames.
Advantages of Wireless Network
Increased efficiency: Improved data communications lead to faster transfer of information within businesses
and between partners and customers. For example, sales people can remotely check stock levels and prices
whilst on sales calls.
Better coverage and mobility: Wires tie you down to one location. Going wireless means you have the
freedom to change your location without losing your connection, without the need of extra cables or
adaptors to access office networks.
Flexibility: Office-based wireless workers can be networked without sitting at dedicated computers, and can
continue to do productive work while away from the office. This can lead to new styles of working, such as
home working or direct access to corporate data while on customer sites.
Cost savings: Wireless networks can be easier and cheaper to install, especially in listed buildings or where
the landlord will not permit the installation of cables. The absence of wires and cables brings down cost. This
is accomplished by a combination of factors, the relatively low cost of wireless routers, no need for
trenching, drilling and feeding wires inside the walls or other methods that may be necessary to make
physical connections. In addition, no wire maintenance is needed
Adaptability: Fast and easy integration of devices into the network, and high flexibility when modifying an
installation.
New opportunities/applications: Wireless networking could allow you to offer new products or services. For
example, many airport departure lounges, train stations, hotels, cafes and restaurants have installed hot spot
wireless networking services to allow mobile users to connect their equipment to their home offices while
travelling.
Disadvantages of wireless network
Security :Wireless transmission is more vulnerable to attack by
unauthorized users, so particular attention has to be paid to security.
Installation problems: You may suffer interference if others in the same
building also use wireless technology or where other sources of radio
signals are present. This could lead to poor communication or, in extreme
cases, loss of wireless communication altogether.
Coverage: In some buildings getting consistent coverage can be difficult,
leading to black spots where no signal is available. For example, in
structures built using steel reinforcing materials, you may find it difficult to
pick up the radio frequencies used.
Transmission speeds: Wireless transmission can be slower and less
efficient than wired networks. In larger wireless networks the backbone
network will usually be wired rather than wireless.
Application of wireless Network
Some of the most common applications of wireless technology:
Mobile communication: Wireless technology enables mobile communication through mobile phones,
tablets, laptops, and other mobile devices.
Internet connectivity: Wireless technology allows users to access the internet wirelessly through Wi-Fi,
cellular data, and other wireless networks.
Smart homes: Wireless technology is used in smart homes to connect devices such as security systems,
smart thermostats, and other home automation devices.
Healthcare: Wireless technology is used in healthcare for patient monitoring, telemedicine, and remote
diagnosis.
Industrial automation: Wireless technology is used in industrial automation for remote control,
monitoring, and data acquisition.
Entertainment: Wireless technology is used in entertainment for streaming audio and video content to
wireless speakers, headphones, and other devices.
Common WLAN Security Attacks
Eavesdropping:Intercepting wireless traffic to read unencrypted data.
Rogue Access Point:Unauthorized AP set up to trick users or gain access to network
traffic.
Evil Twin Attack:Cloning a legitimate SSID to lure users into connecting to a
malicious AP.
Man-in-the-Middle (MITM):Intercepting data between two parties without their
knowledge.
Denial of Service (DoS):Flooding the network to disrupt service (e.g.,
deauthentication attacks).
MAC Spoofing:Faking a legitimate MAC address to gain network access.
Replay Attacks:Capturing data packets and retransmitting them to trick the network.
Brute Force Attacks:Trying many password combinations to break into Wi-Fi.
Deauthentication Attacks: Attackers send deauthentication packets to disconnect
users from the network, forcing them to reconnect to a rogue access point.
Preventing WLAN Security
Attacks
• Use WPA3 Encryption:Strongest wireless security standard (use WPA2 if WPA3 is
unavailable).
• Disable WPS:Wi-Fi Protected Setup is vulnerable to brute-force attacks.
• MAC Filtering:Allows only approved MAC addresses — not foolproof due to
spoofing.
• Hide SSID Broadcasting:Makes your network less visible (but not secure on its
own).
• Strong Passwords:Use long, complex passphrases for Wi-Fi access.
• Regular Firmware Updates:Keeps access points protected from known
vulnerabilities.
• Disable Unused Services:Turn off remote admin, WPS, and guest networks when
not needed.
• Use VPN for Wireless Users:Adds encryption even over compromised WLAN.
• Physical Security:Protect access points from tampering or unauthorized
connections.
Test of wireless connectivity and
security arrangements
• Signal coverage testing
• Performance testing
• In-motion testing
• Security vulnerability testing
• Acceptance/verification testing
• Simulation testing
• Prototype testing
• Pilot testing
• Test documentation
Installing, configuring, and managing the
WLANs devices