Wireless LAN’s

Wireless local area networks (WLANs) use radio or other wireless electromagnetic links to connect devices within a limited area such as a home, office, campus or public hotspot. Wireless technologies differ in the bandwidth they provide, the distance over which nodes can communicate, the portion of the electromagnetic spectrum they use (including whether a licence is required), and their power consumption. Wireless links often appear asymmetric: one endpoint (for example a base station) is fixed and well connected to wired infrastructure, while the other endpoint (a client) may be mobile and rely entirely on the wireless link to reach other networks.

Examples of common wireless technologies

  • Bluetooth - short-range wireless for personal area networks, low power and often used for device-to-device connections (phones, headsets, sensors).
  • Wi-Fi (IEEE 802.11) - the most widely deployed WLAN technology for local area connectivity; supports both infrastructure and ad-hoc operation.
  • WiMAX (IEEE 802.16) - designed for metropolitan area networks and longer-range fixed or nomadic access (initial forms used directional links).
  • 3G / cellular - third-generation cellular systems that provide wide-area mobile data and voice services; cellular systems are often considered alongside WLANs because they are a major class of wireless access.

Basic WLAN architecture and components

Typical WLAN topologies distinguish two major roles:

  • Base station (Access Point) - a fixed infrastructure node that usually has little or no mobility and provides connectivity between wireless clients and wired networks (for example the Internet). Access points implement the bridge between the wireless medium and the wired Ethernet.
  • Client node - a mobile or portable device (laptop, smartphone, IoT device) that relies on the base station's link for communication with other networks and devices.

Wireless communication naturally supports point-to-multipoint operation because radio transmissions can be received simultaneously by many devices. For higher-layer protocols and for routing simplicity, it is common to present a point-to-point abstraction between a client and the base station.

Basic service set and extended service set

  • Basic Service Set (BSS) - the simplest IEEE 802.11 building block consisting of a group of stations that communicate with each other. A BSS may be an infrastructure BSS (stations associated with an access point) or an ad-hoc (independent) BSS where stations communicate directly without an AP.
  • Extended Service Set (ESS) - multiple infrastructure BSSs connected via distribution systems (usually wired) to appear as a single network, enabling devices to roam between access points while retaining connectivity.

Mobility levels in wireless systems

WLAN deployments exhibit different degrees of mobility; it is useful to distinguish three qualitative mobility levels:

  • No mobility - the receiver is fixed relative to a directional or high-gain transmitter and must remain in a precise location to maintain the link. Early fixed WiMAX deployments often used such directional links.
  • Local mobility (within a base station's range) - devices move freely within the radio cell of a single base station without changing the serving AP. Bluetooth is an example where mobility is limited to a small zone around a master device.
  • Roaming mobility (between bases) - devices move across coverage areas of multiple base stations or access points and need handoff/roaming mechanisms to maintain ongoing sessions. Cellular telephony and typical Wi-Fi campus deployments illustrate this level.

Physical layer and channel characteristics

Important physical-layer aspects of WLANs include frequency bands, channel bandwidth, modulation and antenna techniques:

  • Frequency bands - common licence-exempt bands used for Wi-Fi are the 2.4 GHz ISM band and the 5 GHz U-NII bands. These bands differ in available bandwidth, propagation characteristics and number of non-overlapping channels.
  • Channel bandwidth - legacy 802.11 standards use 20 MHz channels; later standards allow 40 MHz, 80 MHz and wider channels to increase throughput (wider channels trade off with spectrum reuse and interference).
  • Modulation and coding - modern 802.11 standards use OFDM (orthogonal frequency-division multiplexing) and advanced modulation/coding schemes to improve spectral efficiency.
  • Antenna technologies - multiple-input multiple-output (MIMO) and beamforming techniques increase throughput and range by using multiple antennas.

Medium access control: shared wireless medium

Because the radio medium is a shared resource, WLANs use specialised MAC algorithms to coordinate access and to reduce collisions. The most common MAC used in 802.11 is CSMA/CA (carrier sense multiple access with collision avoidance).

  • Stations sense the channel before transmission; if the channel is idle for a contention period they attempt transmission after a random backoff interval.
  • To cope with the hidden node problem (two stations cannot hear each other but both can reach the AP), 802.11 supports an optional RTS/CTS (request-to-send / clear-to-send) handshake that reserves the medium and reduces collisions for long frames.
  • 802.11 also provides acknowledgements for unicast frames to ensure reliability over an unreliable wireless medium.

Common problems and performance factors

WLAN performance depends on several interacting factors:

  • Interference and noise - co-channel interference, adjacent-channel interference and non-Wi-Fi interferers (microwave ovens, Bluetooth, cordless phones) reduce effective throughput and reliability.
  • Range vs throughput trade-off - propagation loss increases with distance; data rates are typically auto-scaled down to preserve link quality at longer ranges, reducing throughput.
  • Asymmetric links - uplink and downlink capacities or traffic patterns may be asymmetric; many deployments provision APs with stronger transmit capability and more wired backhaul capacity.
  • Hidden and exposed nodes - medium access inefficiencies caused by nodes that cannot hear each other (hidden) or unnecessarily defer transmissions because they sense transmissions that would not disturb their receiver (exposed).
  • Capacity limits - channel bandwidth, number of spatial streams and contention among users limit aggregate throughput of a WLAN cell.

Roaming and handoff

When a client moves between APs in an ESS, it performs an association and authentication sequence with the target AP. Fast roaming mechanisms reduce interruption time by pre-authenticating with candidate APs and by optimising key exchange; this is important for real-time applications such as voice. Network-level techniques (such as DHCP renewal and session continuity) also influence perceived handoff quality.

Security considerations

Wireless links are exposed to eavesdropping and unauthorised access; WLAN standards therefore include security mechanisms but these have evolved over time:

  • WEP - Wired Equivalent Privacy, the original 802.11 encryption scheme; now considered insecure and deprecated.
  • WPA / WPA2 - Wi-Fi Protected Access improved security. WPA2 introduced AES-based encryption (CCMP) which is widely used in modern networks.
  • WPA3 - the newer standard improving authentication and forward secrecy for open and enterprise networks.
  • Enterprise deployments commonly use 802.1X/EAP for user authentication and per-user key management.

Quality of Service and power management

  • QoS (802.11e) - provides differentiated access to the medium using traffic categories so voice and video can obtain lower latency and better service than best-effort data.
  • Power management - clients use power-save modes to reduce energy consumption. The AP buffers frames for sleeping clients and delivers them when the client wakes; some modern schemes use scheduled delivery to reduce wake time.

Standards evolution and variants

The IEEE 802.11 family has evolved through multiple amendments to increase speed, spectrum efficiency and features. Some commonly referenced variants are:

  • 802.11b - early higher-rate use of the 2.4 GHz band (up to 11 Mbps).
  • 802.11a / 802.11g - 54 Mbps class devices; 802.11a operates in 5 GHz while 802.11g operates in 2.4 GHz.
  • 802.11n - introduced MIMO and higher throughput.
  • 802.11ac - improved performance in 5 GHz with wider channels and more spatial streams.
  • 802.11ax (Wi-Fi 6) - focuses on spectral efficiency with techniques such as OFDMA and improved multi-user operation.

Deployment examples and typical use cases

  • Home networks - single or dual-band APs providing broadband access for multiple devices.
  • Enterprise and campus networks - multiple APs forming an ESS with centralised controllers, authentication servers and traffic management.
  • Public hotspots - lightweight APs offering internet access with captive portals and often limited QoS or bandwidth per user.
  • IoT and sensor networks - low-power Wi-Fi or specialised short-range technologies such as Bluetooth/BLE for device connectivity.

Troubleshooting and best practices

  • Survey the RF environment before deployment to select channels and place APs to minimise co-channel and adjacent-channel interference.
  • Use appropriate channel widths and band selection (2.4 GHz for range, 5 GHz for capacity and less interference) depending on expected client mix and environment.
  • Enable modern security (WPA2/WPA3) and use strong authentication (802.1X) for enterprise networks.
  • Plan for capacity: estimate concurrent users, required throughput per user and backhaul capacity to avoid bottlenecks.
  • Employ QoS for latency-sensitive applications (voice, video) and tune power settings for coverage and client battery life.

Summary

WLANs provide flexible, ubiquitous local connectivity but present unique design challenges because the wireless medium is shared, lossy and subject to interference. Understanding the roles of base stations and client nodes, the differences between infrastructure and ad-hoc modes, the MAC and physical mechanisms (CSMA/CA, RTS/CTS, OFDM, MIMO), and the evolution of security and QoS features is essential for designing, deploying and troubleshooting reliable wireless local area networks. Different wireless technologies (Bluetooth, Wi-Fi, WiMAX, cellular) occupy distinct parts of the design space in terms of range, bandwidth and mobility; selecting the right technology and carefully planning deployment are key to meeting application requirements.

The document Wireless LAN’s is a part of the Computer Science Engineering (CSE) Course Computer Networks.
All you need of Computer Science Engineering (CSE) at this link: Computer Science Engineering (CSE)

FAQs on Wireless LAN’s

1. What is a wireless LAN?
Ans. A wireless LAN (Local Area Network) is a type of computer network that allows devices to connect and communicate wirelessly using radio waves instead of physical cables. It enables users to access the internet, share files, and connect to other devices within a specific area.
2. How does a wireless LAN work?
Ans. A wireless LAN works by using a wireless access point (AP) that connects to the wired network. The AP acts as a central hub, transmitting and receiving data between wireless devices and the wired network. When a device wants to communicate, it sends data packets over the air using radio frequencies. The AP receives these packets and forwards them to the appropriate destination within the network.
3. What are the advantages of using a wireless LAN?
Ans. Some advantages of using a wireless LAN include: - Mobility: Users can connect to the network from anywhere within the coverage area, allowing for greater flexibility and convenience. - Cost savings: Installing and maintaining physical cables can be expensive, while wireless LANs eliminate the need for extensive wiring. - Scalability: Wireless LANs can easily accommodate new devices without the need for additional cabling or infrastructure. - Accessibility: Multiple devices can connect to the network simultaneously, enabling easy collaboration and resource sharing. - Ease of installation: Setting up a wireless LAN requires minimal physical configuration compared to wired networks.
4. What are the security considerations for wireless LANs?
Ans. Security is a crucial aspect of wireless LANs. Some important security considerations include: - Encryption: Implementing encryption protocols such as WPA2 or WPA3 helps protect data transmitted over the wireless network from unauthorized access. - Authentication: Using strong passwords and implementing authentication methods like WPA-Enterprise or 802.1X ensures that only authorized users can access the network. - Access control: Configuring access control lists (ACLs) or MAC address filtering can restrict access to the wireless network to specific devices or users. - Firewall and Intrusion Detection/Prevention Systems: Deploying these security measures helps monitor and prevent unauthorized access or malicious activities within the wireless LAN.
5. What are the potential limitations of wireless LANs?
Ans. While wireless LANs offer numerous advantages, they also have some limitations, including: - Range: The coverage area of a wireless LAN is limited, and obstacles such as walls and interference from other devices can further reduce the effective range. - Interference: Other wireless devices operating on similar frequencies, such as Bluetooth devices or microwave ovens, can cause interference and degrade the performance of a wireless LAN. - Bandwidth limitations: Wireless LANs generally have lower data transfer rates compared to wired networks, especially in crowded environments with multiple connected devices. - Security vulnerabilities: Wireless LANs are susceptible to security breaches if not properly secured, making them potential targets for unauthorized access or data interception.
Explore Courses for Computer Science Engineering (CSE) exam
Get EduRev Notes directly in your Google search
Related Searches
Wireless LAN’s, Free, Exam, Previous Year Questions with Solutions, Important questions, ppt, Viva Questions, past year papers, study material, Extra Questions, MCQs, Sample Paper, Wireless LAN’s, Objective type Questions, mock tests for examination, Wireless LAN’s, Summary, practice quizzes, pdf , video lectures, shortcuts and tricks, Semester Notes;