Practice Exams  
  - A+ Core -  
  - A+ OS -  
  - Network+ -  
  - Security+ -  
  - Linux+ -  
  Search the Web  
  Watch free videos online  
  Subnet Calculator  
  Online Degrees  
  Exam Vouchers  
  Free Magazines  

Network+ TechNotes - Wireless Networking

Members-only Printer-friendly version
Download the complete PDF guide
with all our Network+ TechNotes

IEEE 802.11 Standards
- 802.11b
- 802.11a
- 802.11g
- 802.11 Network Operation
- Ad Hoc and Infrastructure Mode
Wireless Access Point (WAP)
- Omni-directional
- Semi-Directional
- Highly-Directional
Environmental Factors and Interference
Wireless Network Security
- WEP (Wired Equivalent Privacy)
- WPA (Wi-Fi Protected Access)

Although wireless networking has been around a lot longer than many people assume, it is only since the past 5 years that the cost of wireless networking equipment has dropped dramatically and therefore became widely available to large enterprises, small companies and even home users. Nowadays, you can hardly walk through a populated area without absorbing someone’s wireless signal. Airports and hotels offer wireless Internet access to travelers, companies offer wireless access to mobile users within the organization, and wireless Internet access on cell phones is almost becoming a standard feature. Despite the negative reputation of wireless networking in regards to security, it is still increasing in popularity.

For the Network+ exam, you need to know about several of the wireless networking technologies available today. This includes the popular IEEE 802.11 standards, Infrared, Bluetooth, and related devices and concepts. Each of these technologies has its own best suitable purposes, advantages and disadvantages. Before we look at those, let us have a look at the best suitable purposes for wireless networking in general.

- Connectivity for mobile users and office
The percentage of mobile users in organizations is growing rapidly. Mobile users often spend most of their time outside the office, and when they are in the office, they often share workspace and do not have their own office or cubicle. If you have 50 mobile users, you may only need 5 workspaces because most of them will be in the field. This makes wireless connectivity an ideal solution for mobile users. Outside the office, they can use a public hotpot to connect with their laptop to corporate network, or use a technology such as GPRS to access their email by using a smartphone or PDA.

- Building-to-building connectivity
Putting cables in the ground to connect two buildings is often a very expensive solution for building-to-building connectivity, even if the buildings are near each other. A wireless connection is can be very suitable in such situations as it is relatively cheap and easy to implement.

- Last mile data delivery
Wireless connections can be a very suitable replacement for wired connections in areas where it may be difficult or expensive to extend the cable network to every location. A typical example of last mile data delivery using wireless communication are satellite Internet connections in rural areas. Instead of using expensive cables for DSL connections to cover long distances to houses in low-populated areas, a central location is connected by cable and wireless connectivity is provided from that central location to the Internet subscribers in the area. New advances in wireless technology, such as 802.11n and 802.16 (outside scope for Network+) are making it a competitive “last mile” technology in densely populated areas too.

- Public environments
Wireless networking is very suitable for public environments such as airports and beaches. In many cities around the world, you can sit outside on a terrace, drink a coffee, and connect to a public hotspot to browse the web or check your email. A hotspot is public wireless access point that allows users to access the Internet using a laptop or other mobile device. Hotspots are free or require some sort of subscription or ticket.

Wireless networking is a great addition to the available ingredients for small to large networks, but it is not meant to replace every cable on the planet. There are many situations in which wireless networking is usually not suitable; following are some examples:

- Backbone connections in a datacenter
Due to the limited of data transfer rates, wireless LAN technologies are not suitable for backbones. 802.11g allows up to 54Mbps for example, and the effective rate is even lower. The data transfer rates for a backbone that connects servers and other networking devices in a datacenter, typical range from 100 Mbps to 10Gigabit Ethernet.

- Factory floors
Although it may seem appealing to reduce the number of cables on a factory floor, the machinery in factories often produces a level of electromagnetic interference (EMI), which can drastically reduce the data throughput in a wireless network. Wireless networks can operate at different frequencies (2.4 and 5 GHz), and use noise-resistant transmission patterns (FHSS), but even this may not be enough to overcome the affects of very electronically noisy environments.

- Highly secure environments
Wireless networking is a relatively insecure network technology and is therefore less suitable for highly secure environments. You do not need physical access to access the physical layer of a wireless network. A malicious individual can tap into a wireless network relatively easier than into a wired network. In case of the latter, he or she would need access to a cable, hub, or switch for example, to tap into a wired network. Wireless network traffic however, is all around us, and can be grabbed from the ‘air’ by anyone with the right tools. In most cases, they would still need to decrypt the traffic, but that often turns out to be easier than physically accessing a wired network.

IEEE 802.11 Standards

The IEEE 802.11 standard defines the MAC layer (sublayer of Data Link layer) and Physical layer specifications for Wireless LANs with data rates of 1 and 2 Mbps. It was first completed in 1997 but went through several changes until it was finalized in 1999. The MAC layer specifications are concerned with how the network devices access the medium, in this case, the air. 802.11 uses the 2.4 GHz frequency band. The Physical layer specifications in 802.11 define standards for three different radio technologies: Direct Sequence Spread Spectrum (DSSS), Frequency Hopping Spread Spectrum (FHSS), and InfraRed (IR).

In 2001, the IEEE approved two new amendments for the original 802.11 standard, but with additions to the Physical layer specifications: the 802.11a and 802.11b standards. The term 802.11x is sometimes used to refer to the entire group of 802.11 WLAN standards, of which some are still under development. It includes the standards outlined above, as well as several others addressing the need for speed, region specific regulations, and security. Do not confuse 802.11x with 802.1x, the layer 2 port-based authentication protocol that provides authenticated access to 802.11 wireless networks and wired Ethernet networks.


The first wireless networking products that became widely available are based on the extended IEEE 802.11b standard. Because of the availability and affordability of 802.11b equipment, it has become popular especially in small and home networks. According to the standard, 802.11b provides data rates of 5.5 and 11Mbps, and is backwards compatible with the 1 and 2 Mbps data rates of 802.11. An organization called Wi-Fi Alliance, formerly known as the Wireless Ethernet Compatibility Alliance (WECA), is concerned with the compatibility of 802.11b equipment from different manufacturers. When products based upon the 802.11b standard pass the compatibility tests performed by the Wi-Fi Alliance, they are awarded the WiFi (Wireless Fidelity) logo. 802.11b operates on the 2.4 GHz frequency band just like 802.11.


It took several years before a wide range of products based upon the 802.11a standard became available. When they finally did around 2002, more companies became interested in wireless networking. The primary reason for this is that the 802.11a standard increases the maximum data throughput to 54 Mbps. However, 802.11a is not backward compatible with 802.11 and 802.11b because it uses the 5 GHz frequency band instead of 2.4 GHz, and a different modulation scheme (OFDM instead of QPSK).


The 802.11g standard also allows data transfer rates up to 54 Mbps, but is backward-compatible with both 802.11 and 802.11b, supporting both their data rates (1, 2, 5.5, and 11 Mbps) and modulation scheme (QPSK). 802.11g also supports the modulation scheme used by 802.11a (OFDM), but is not compatible with 802.11a because 802.11g uses the 2.4 GHz frequency band. While both standards define 54 Mbps as the maximum throughput, in reality it is closer to 50% of that.

802.11 Network Operation

802.11 can be considered the wireless equivalent of 802.3 wired Ethernet, but there are some major differences. The first one is obviously the media, which carries the network traffic. For wired Ethernet networks, the medium is the cable, a copper or fiber cable for example, and the network traffic is a collection of electrical signals or light pulses. For a wireless network, the media is the air, and the network traffic is a radio wave on a particular frequency in the Radio Frequency (RF) spectrum.

Not just the media, but also the access method of an Ethernet network and an 802.11 wireless network is different. Ethernet networks use the Carrier Sense Multiple Access/Collision Detection (CSMA/CD) access method. This means a station listens to check if the cable is currently accessed before starting its own data transmission. When two stations both determine the media is available and start sending the data simultaneously, a collision occurs, meaning the electrical signals on the cable collide with each other. When the collision is detected, both stations will retransmit the data after a different and random amount of time determined by a backoff algorithm.

In a wireless 802.11 network, the access method is Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA). This means that if a wireless station determines the network is busy, it will also back off for a random amount of time, but because collisions between wireless signals cannot be detected, acknowledgments are used to inform stations of the availability of the media. If an acknowledgment is not received for a packet, the sender will assume that a collision occurred and the packet was lost. CSMA/CA in wireless networks does not operate exactly the same as CSMA/CA in some wired networks such as LocalTalk, in which broadcasts are used to notify other stations the network is busy and thereby avoiding collisions.

Ad Hoc and Infrastructure Mode

Wireless stations can be interconnected in a peer-to-peer network, also known as an ad-hoc network or Independent Basic Service Set (IBSS). In this type of wireless LAN clients communicate directly with each other and do not use an access point. Wireless stations need to be configured with a matching Service Set Identifier (SSID) and a channel. The SSID is a case sensitive, alphanumeric value of 2-32 characters long, used to define a wireless network. The channel defines a specific range in the RF spectrum, and only a portion of the available frequency range. This allows multiple wireless networks to coexist in the same area as long as they use a different channel. To be able to communicate with each other through TCP/IP they must of course have an IP address in the same IP subnet.

Wireless LAN in Ad-Hoc Mode
Wireless LAN in Ad-Hoc Mode

In a wireless LAN in i nfrastructure mode , network stations are interconnected through one or more Wireless Access Points (WAPs), which results in a star network topology similar to a wired Ethernet network using switches and hubs. The w ireless stations are configured with an SSID that matches the SSID configured on the WAP. The channel is configured on the WAP only.

Wireless LAN in Infrastructure Mode
Wireless LAN in Infrastructure Mode

Wireless Access Point (WAP)

A wireless access point (WAP) is essentially a hub equipped with one or more, fixed or removable antennas to provide wireless capabilities. Just as with a wired hub, all of the attached clients share the available medium. A major difference with a wired hub is that WAPs have Layer 2 functionality. As you may remember from the first paragraph in the IEEE 802.11 Standards section above, the 802.11 standards includes specifications for the Physical and the MAC layer (sublayer of Data Link layer). When a wireless client wants to ‘attach’ to a WAP to send and receive data through it, it first needs to be associated and authenticated with the WAP. The client initiates this process by broadcasting its own MAC address to identify itself to the WAP. So a WAP, unlike a hub, reads the MAC addresses in data frames, hence operates at the bottom two layers of the OSI model: the Physical layer and the Data Link layer. We will cover this process in more detail in the Wireless Network Security section below.

Wireless Access Point (WAP)
Wireless Access Point (WAP)

Besides interconnecting wireless network stations, a WAP is typically used to integrate wired and wireless stations into a single network. Actually, most WAPs offer additionally functionality, such as bridging/switching and routing (Layer 3 / Network Layer) even. Many consumer WAPs have several built-in wired switch ports as USB and UTP interfaces, but the enterprise WAPs used in commercial applications do not. Instead, it usually provides a single bridge port to connect the WAP to a wired network, allowing it to function as a gateway bridge for wireless clients.

Remember that a switch is just a multiport bridge, so if you interconnect LAN segments with a switch, you are effectively bridging. For example, a WAP can function as a bridge between a wired Ethernet 802.3 and a wireless 802.11b network. As depicted in the image below, the stations on the wired and the wireless network become part of the same LAN, and use an IP address from the same IP subnet. In other words, they become part of the same broadcast domain. However, the stations on the wireless segment are all in the same collision domain, while every wired connection on the WAP (and each connection behind the switch) is its own collision domain.

WAP functioning as bridge
WAP functioning as bridge between wired and wireless segment

Almost every wireless network connects to a wired network at some point. In a SOHO network, the wired network is often the Internet connection. The following diagram shows a typical example in which the WAP functions as a router, also referred to as a wireless access router.

WAP functioning as router
WAP functioning as router

The wireless access router appears as the only client to the ISP, and usually performs NAT for the connected wireless clients instead of actually created a routed connection. A DHCP server, running on the WAP, assigns the clients an IP address from a private address range. A WAP functioning as a router, operates also on the Network layer of the OSI model an separates broadcasts and collision domains just like a router between two wired networks would.

Another use of a wireless access point is to extend network connection by functioning as a repeater. Remember that a repeater amplifies the signal to allow a connection to span a larger distance. The following diagram depicts a simple network with a wireless access point repeating the signal to allow it to cross the distance. The preferred method would be to use a more power antenna.
WAP functioning as repeater
WAP functioning as repeater

Read the Internet Connections TechNotes for more information about routed and translated connections, and read the Network Components TechNotes for more information about bridges, switched, routers, and broadcast and collision domains.

Modern WAPs often support multiple 802.11 standards, often referred to as ‘modes’. For example, B-only Mode (802.11b), G-only Mode (802.11g), and B/G (mixed) Mode. The latter allows for a mixed environment, which sounds convenient but should only be used temporarily, e.g. when migrating from 802.11b to 802.11g, but preferably be avoided entirely. Allowing both 802.11b and 802.11g clients to connect to the same access point has significant negative impact on the performance. In B-only mode, the AP only uses DSSS allowing up to 11 Mbps of bandwidth (in reality about 5.5 Mbps of data throughput). In G-only mode, the AP only uses OFDM, and only 802.11g clients can connect to the AP, allowing up to 54 Mbps of bandwidth (in reality about 20 Mbps of data throughput). In mixed mode, the AP uses both DSSS and ODFM, supporting both 802.11b and 802.11g, but reducing the total realistic data throughput from 20 Mbps to 8 Mbps or less, when both 802.11b and 802.11g clients are connected.


Although most WAPs and wireless network cards have integrated antennas, many of them allow an external antenna to be connected. The main advantage is that a different, more powerful antenna can be connected to increase the maximum range. The latter is important to provide proper connectivity to clients or other wireless devices. The further a client is located from a WAP, the weaker the signal it receives will be. If a client is entirely out of range, the signal will be too weak, preventing the client from connecting. Another advantage of using an external antenna is that it can be placed outdoors while connected to a WAP indoors. The cable running from the WAP or WLAN NIC to the antenna is often a proprietary cable, also referred to as a pigtail. The connectors for these pigtails differ per brand. High-end antennas typically use a coaxial cable with an F-type connector. The quality and length of the cable have a significant influence on the signal power.

Following are the three main types of antennas, omni, semi, and highly-directional, and Each type has its own characteristics and suitable purposes and are discussed below.


This is the most common type of antenna on WAPs and wireless network cards, usually referred to as a dipoleantenna or just dipole (similar to a magnet having two poles). The ‘rabbit ears’ on older TVs is a classic example of a dipole antenna. The following image depicts a simple dipole antenna; the donut-shaped wireframe show how the signal propagates.

omni antenna - side view

omni antenna - top view

Omni antenna – Side view

Omni antenna – Top view

Omni-directional antennas are particularly suitable for point-to-multipoint connections and a re often used in conjunction to create a large wireless network with to a cell topology as depicted below. At the center of these cells is an omni antenna of which the signal coverage overlaps slightly with adjacent cells to provide full coverage. The cell topology with omni antennas is used both indoors and outdoors. The most know outdoor example is of course the cell phone network using GSM or UMTS for example.

Cells in a wireless network


The Yagi and the Patch antenna are two common types of semi-directional antennas. They each use a similar method to force the signal to propagate into a certain direction. The Yagi antenna is typically used for point-to-point and point-to-multipoint connections outdoors. The element with the black protective cover on the Yagi antenna below is the one connected to the cable. The element left from it reflects the signal while the elements on the right help propagate the signal in the right direction.
Directional Yagi Antenna
Directional Yagi Antenna

A directional patch antenna contains a back panel and a ‘patch’ inside the box as depicted in the image below on the right. The back panel performs the same function as the reflective element in the Yagi antenna, it reflects the signal originating from the patch and forces it to propagate into a certain direction. Patch antennas are typically used for point-to-multipoint connections outdoors and point-to-point connections indoors.

Directional Patch Antenna
Directional Patch Antenna


Highly-directional antennas are most suitable for outdoor long distance point-to-point connections. The p arabolic dish and the parabolic grid are the most common examples of highly-directional antennas. The main difference between them is the structure of the antenna, which enables the parabolic grid to withstand strong winds.

Parabolic Dish Antenna

Parabolic Grid Antenna

Parabolic Dish Antenna

Parabolic Grid Antenna

The following image depicts the RF beam of a highly-directly antenna. The dish or grid bundles the signal and forces the signal to propagate in a specific direction . An important requirement for point-to-point connections using highly-directional antennas is a clear line of sight. If a building or other large obstacle blocks the visibility between two highly-directional antennas, the narrow beam will neither be able to avoid the obstacle.

Highly-directional antenna
Highly-directional antenna

Besides point-to-point connections, directional antennas are often used in combination with omni antennas to create point-to multipoint connections. For example, the main building on a campus could have an omni antenna on the roof and several smaller buildings each use a directional antenna to connect to the main building.

Environmental Factors and Interference

Radio Frequency Interference (RFI) is one of the major challenges for wireless networks. RFI refers to interference of other devices that operate on the same radio frequency, which can cause delays, hence reduced data throughput and even loss of data and connectivity. Common sources of RFI in 802.11b and 802.11g networks are cordless phones, microwave ovens, neighboring wireless LANs, and Bluetooth devices, which like the former, operate in the 2.4-GHz band.

One of the major factors on the signal quality in wireless networks is the environment. Walls, plants, windows, office equipment and human beings are examples of obstacles in indoor wireless networks that can have a negative impact. Outdoors, trees, mountains, lakes, buildings and other structures absorb or reflect the signal causing undesired results.

The primary cause of signal power in a wireless network is path loss, which refers to the signal power decreasing by distance. This is commonly compared to a flashlight: as the distance increases, the beam gets wider shining less light on its target. The same thing happens with an RF wave, and it is also known as dispersion. Eventually the signal will be to low for the receiving antenna to separate data from noise.

Wireless Network Security

WEP (Wired Equivalent Privacy)

The Wired Equivalent Privacy (WEP) protocol is part of the 802.11 standard and is developed as an effort to provide privacy in wireless networks similar to privacy in wired networks. Intercepting traffic (eavesdropping) on a wireless network is very easy compared to wired networks, so it is essential that data frames are encrypted.

When a station powers up, and attempts to establish a wireless connection, it will first be associated with an access point. When the station is associated, it will attempt to authenticate itself to the access point. The original IEEE 802.11 standards provide the following two types of authentication:

  • Open System Authentication -The client broadcasts its MAC address to identify itself, an AP replies with an authentication verification frame. Although its name implies differently, no actual authentication occurs when Open System Authentication is used.
  • Shared Key Authentication - The client will be authenticated only if it is configured with a preshared key. This means that the same key must be configured on both the client station and the AP. The AP sends a challenge text to the client requesting authentication, which is encrypted using WEP and the shared key at the client, and then send back to the AP where it is decrypted again to see if it matches the original challenge. If it matches, the client will be able to start transmitting and receiving data and participate in the network.
The WEP key used for authentication can also be used to encrypt the wireless traffic. Although this produces a significant amount of overhead on low-speed wireless networks such as 802.11b, it should be enabled if no other, better, security method is used instead of WEP. WEP offers rather weak security that can be relatively easily cracked using widely available tools that can be found free on the Internet. WEP uses the RC4 cipher, with key lengths of 64 and 128-bits. The key includes a 24-bit Initialization Vector (IV), which is sent in clear text format, so actually the secret portion of the WEP keys are 40 and 104-bits.

In 2004 the 802.11 standard was updated by the IEEE 802.11i workgroup in an effort to increase security in wireless networks. This resulted in WPA and WPA2, which should be used instead of WEP whenever available.

WPA (Wi-Fi Protected Access)

Wi-Fi Protected Access (WPA) is a standard released by the Wi-Fi Alliance to provide more advanced security for 802.11 wireless networks, including stronger encryption and authentication methods. It includes the Temporal Key Integrity Protocol (TKIP), which offers dynamic key distribution. RC4 is still used for the actual data encryption, but they key used to encrypt the data is changed periodically. This makes it harder to crack than WEP. WPA also supports authentication through the IEEE 802.1x port-based authentication protocol.

While WPA and TKIP were designed as a more secure replacement for WEP, partly because RC4 was still used several flaws were quickly discovered. The Wi-Fi Alliance released WPA2 in 2004, which adds support for the Advanced Encryption Standard (AES) to allow for much stronger encryption.

The best approach to secure wireless networks is to implement multiple layers of security. A secure wireless network employs security technologies such as IPSec, 802.1x authentication, and strong encryption protocols. A c ostly but secure option is using Virtual Private Networks (VPN), and basically treat the wireless network as if it were a public network like the Internet.



The Infrared Data Association (IrDA) creates standards for short-distance infrared communication. It defines data transmission rates from 9600 bps with primary speed/cost steps of 115 Kbps, a maximum of 4 Mbps for Fast IrDA and a maximum of 16 Mbps for Very Fast IrDA . Infrared is commonly used to exchange data between mobile devices and other devices such as printers. The primary limitation of infrared communication is that it requires a clear line-of-sight. IR waves are easily absorbed and reflected by obstacles, which is the main reason why network communication using infrared light is not very popular.


Bluetooth is a wireless networking technology that is very common in Personal Area Networks (PANs). A PAN covers the area directly surrounding the user, and typically includes handheld devices such as PDAs and smartphones. Wireless connectivity allows users to synchronize files, email, and connect to printers and other network devices. Bluetooth is also popular for providing connectivity between non-network devices, such as connecting hands-free sets to phones or controllers to videogame systems. The specified maximum data transfer rate is 1 Mbps, but in reality it is much lower. Bluetooth with Enhanced Data Rate offers transfer rates up to 3 Mbps, but again the effective rates are much lower.

Bluetooth operates in the unlicensed ISM band at 2.4GHz and uses the FHSS (Frequency Hopping Spread Spectrum). It avoids interference from other signals by hopping to a new frequency after transmitting or receiving a packet. Compared to other systems in the same frequency band, the Bluetooth radio hops faster and uses shorter packets. Bluetooth's hop rate of 1,600 hops per second over 79 channels means the chance of other signals interfering is very low, but the hopping also limits the maximum transfer rates. The main reason why Bluetooth uses FHSS instead of DSSS is that FHSS is much simpler, requiring less powerful chips, using less power. The latter is obviously very important for handheld devices that run on batteries.


Current related exam objectives for the Network+ exam.

1.2 Specify the main features of 802.11 (wireless) networking technologies, including:
- Speed
- Access Method (CSMA / CA (Carrier Sense Multiple Access/Collision Avoidance))
- Topology
- Media

1.4 Recognize the following media connectors and/or describe their uses:
- F-Type

1.6 Identify the purposes, features and functions of the following network components:
- WAPs (Wireless Access Points)

1.7 Specify the general characteristics (For example: carrier speed, frequency, transmission type and topology) of the following wireless technologies:
- 802.11 (Frequency hopping spread spectrum)
- 802.11x (Direct sequence spread spectrum)
- Infrared
- Bluetooth

1.8 Identify factors that affect the range and speed of wireless service (For example: interference, antenna type and environmental factors).

2.3 Identify the OSI (Open Systems Interconnect) layers at which the following network components operate:
- WAPs (Wireless Access Point)

2.17 Identify the following security protocols and describe their purpose and function:
- WEP (Wired Equivalent Privacy)
- WPA (Wi-Fi Protected Access)

Click here for the complete list of exam objectives.

Discuss this TechNote here Author: Johan Hiemstra


Featured Sponsors

TrainSignal - “Hands On” computer training for IT professionals. Network+ Training, MCSE, Cisco & more! Visit Train Signal’s free training site to get loads of Free Computer Training, videos, articles and practice exams.


All images and text are copyright protected, violations of these rights will be prosecuted to the full extent of the law.
2002-2011 TechExams.Net | Advertise | Disclaimer

TechExams.Net is not sponsored by, endorsed by or affiliated with CompTIA. CompTIA A+, Network+, Security+, Linux+, Server+, CTT+. , the CompTIA logo and trademarks or registered trademarks of CompTIA in the United States and certain other countries. All other trademarks, including those of Microsoft, Cisco, and CWNP are trademarks of their respective owners.