~2 min read • Updated Aug 4, 2025

1. WLAN Key Characteristics


  • Half-Duplex Transmission: Devices share the same frequency for sending and receiving
  • Environmental Impact: Walls, water, and metals attenuate signals
  • Higher frequencies → higher data rate, lower range | Lower frequencies → wider range, lower data rate

2. Wireless Standards Organizations


OrganizationPurpose
IEEEDevelops and maintains operational standards
FCCRegulates wireless usage in the U.S.
ETSIEuropean telecommunications standards
Wi-Fi AlliancePromotes device interoperability
WLANAEducates consumers about WLANs

3. IEEE 802.11 Standards


StandardYearFrequencyData Rate
802.11b19992.4 GHz11 Mbps
802.11a19995 GHz54 Mbps
802.11g20032.4 GHz54 Mbps
802.11n20102.4/5 GHzUp to 300 Mbps
802.11ac20135 GHzUp to 1 Gbps
802.11ax20212.4/5/6 GHzUp to 9.6 Gbps

4. Wi-Fi 5 vs Wi-Fi 6 Comparison


ParameterWi-Fi 5Wi-Fi 6
Frequency5 GHz2.4/5/6 GHz
Channel WidthUp to 160 MHzUp to 160 MHz
Data RateUp to 3.5 GbpsUp to 9.6 Gbps
Modulation256-QAM1024-QAM
User Capacity48

5. Cellular Technologies


GenerationBandwidthStandard
3G2 MbpsWCDMA, CDMA-2000
4G/LTE200–1000 MbpsLTE, WiMAX
5GUp to 10 GbpsmmWave, MIMO

6. WLAN Components


  • WAP: Bridge between wireless devices and LAN
  • NIC: Internal or USB wireless adapter
  • Antennas:
    • Omni-directional: 360° coverage
    • Yagi (Directional): Long range, focused beam

7. WLAN Deployment Modes


  • Ad Hoc: Direct device-to-device communication
  • Infrastructure: Devices connect via AP to LAN

8. Wireless Controllers and AP Management


  • Thick APs: Independently managed
  • Thin APs: Centrally managed via WLC with CAPWAP
  • VLAN Pooling: Helps reduce broadcast domain

9. Antenna Gain Units



dBi: Relative to an isotropic antenna  
dBd: Relative to dipole antenna  
dBd = dBi - 2.2  
Examples:  
Yagi 7 dBd → 9.2 dBi  
Omni 4.8 dBd → 7 dBi

10. Site Survey


  • Collect user and coverage requirements
  • Identify obstacles and signal overlap
  • Use tools like Ekahau or AirMagnet
  • Optimize signal strength across floors

11. WLAN Security


Threats:


  • Rogue APs
  • Unmonitored Ad Hoc networks
  • DoS attacks via jamming or spoofing
  • Passive attacks like packet sniffing

Defenses:


  • Use WLC with CAPWAP protocol
  • Send Deauthentication frames
  • Enable MFP (Management Frame Protection)
  • Deploy Wireless IDS/IPS

Security Mechanisms:


  • Open Access: Public networks (no encryption)
  • WEP: Weak encryption, vulnerable
  • WPA: Dynamic TKIP encryption
  • WPA2: Strong AES-CCMP encryption (recommended)
  • MAC Filtering: Device-based access control (spoofable)
  • PSK: Shared password between AP and device

Written & researched by Dr. Shahin Siami