Unit VII - Wireless Networking
Learning Outcomes
After studying this unit, you should be able to:
Define wireless network
Enumerate types of wireless networks
Differentiate types of wireless networks
Set up wireless network
Introduction
Everyone has heard of Wi-Fi and uses it to connect to the internet, wireless printers, and
other devices on their computer, smartphone, or tablet. But, how does wireless technology
work? The process of exchanging data wirelessly, as in over the airwaves, is known as wireless
networking or Wi-Fi (Wireless Fidelity). It connects stations or devices by sending
electromagnetic waves via open space. Computers, cellphones, tablets, printers, and other
devices are examples of devices. In order for this to operate, each device must be able to
connect to each other and communicate, exactly like with cabled networking.
Without the need of wires, users may communicate and access applications and
information. Allows for mobility and the extension of applications to other portions of a building,
city, or practically anyplace on the planet. People can use wireless networks to check e-mail or
surf the Internet from wherever they want.
In most circumstances, a device known as a hotspot or access point will be placed
between each device. Each device will be connected to this hotspot, which will enable wireless
communication between them. Network cabling linked to a switch or other network device is
typically used to connect these access points to the network infrastructure. For example, a
network cable would connect your home wireless router to your broadband modem, allowing
your wireless devices to connect to the Internet through the modem. To extend your wireless
signal, you can have access points connect to other access points. Range extenders are what
they're called.
A wireless network diagram at your house, business, mall, or public venue is shown
below.
Source: https://www.onlinecomputertips.com/support-categories/networking/627-wireless-
networking-and-standards
Lesson 1. Types of Wireless Networks
1. WLANS: Wireless Local Area Networks
WLANS allow users in a local area, such as a university campus or library, to form a
network or gain access to the internet. A temporary network can be formed by a small number
of users without the need of an access point; given that they do not need access to network
resources.
2. WPANS: Wireless Personal Area Networks
Infrared (IR) and Bluetooth are the two current wireless personal area network
technologies (IEEE 802.15). Personal gadgets will be able to connect within a 30 foot radius
using these. IR, on the other hand, requires a direct line of sight and has a shorter range.
3. WMANS: Wireless Metropolitan Area Networks
This technique allows numerous networks in a metropolitan region, such as separate
buildings in a city, to be connected, and can be used as a backup or alternative to constructing
copper or fiber wiring.
4. WWANS: Wireless Wide Area Networks
Multiple satellite systems or antenna sites managed by an ISP can sustain these types
of networks over enormous areas, such as cities or countries.
Lesson 2. Comparison of Wireless Network Types
Type Coverage Performan Standards Applications
ce
Wireles Within Moderate Wireless PAN Within reach of a Cable
s PAN reach of a person Moderate Bluetooth, IEEE replacement for
person 802.15, and IrDa Cable replacement peripherals
for peripherals
Wireles Within a High IEEE 802.11, Wi-Fi, and HiperLAN Mobile extension
s LAN building or of wired
campus networks
Wireles Within a High Proprietary, IEEE 802.16, and WIMAX Fixed wireless
s MAN city between homes
and businesses
and the Internet
Wireles Worldwide Low CDPD and Cellular 2G, 2.5G, 3G, and Mobile access to
s WAN 4G the Internet from
outdoor areas
Two standards bodies are primarily responsible for implementing WLANs:
1. In order for vendors to build compatible devices, IEEE describes the mechanical method of
how WLANs are implemented in the 802.11 standards.
2. The Wi-Fi Alliance certifies companies by checking that their devices comply with the 802.11
standards, allowing users to buy WLAN solutions from a variety of suppliers without worrying
about compatibility difficulties.
Lesson 3. Wireless Security Protocols
1. WEP
WEP (Wired Equivalent Privacy) was the first encryption-based security solution for
WLANs. WEP employs a static 64-bit key with a 40-bit key length and a 24-bit initialization
vector (IV). The IV is sent in plain text. WEP can be broken since it employs the RC4 encryption
technique and the IV is sent in clear-text. The key was extended to 104 bits with the IV value to
solve this problem. On today's laptops and computers, however, either variety can be readily
broken in minutes.
2. 802.1x EAP
The Extensible Authentication Protocol (EAP) is a layer 2 protocol that allows a wireless
client to connect to a network and authenticate itself. There are two types of EAP: one for
wireless connections and one for LAN connections (also known as EAP over LAN) (EAPoL).
Allowing a WLAN client to communicate with devices behind an AP is one of the
concerns in wireless. EAP, 802.1x, and Remote Authentication Dial In User Service are the
three standards that specify this process (RADIUS). EAP establishes a standard for
encapsulating authentication data, such as a username and password or a digital certificate,
which the AP can use to verify the user's identity. RADIUS and 802.1x define how EAP
information is packetized and moved across the network.
3. WPA
The Wi-Fi Alliance created Wi-Fi Protected Access (WPA) as an interim security solution
to allow for the usage of 802.1x and improvements in the use of WEP until the 802.11i standard
was finalized. WPA has two modes of operation: personal and enterprise. Personal mode was
created for use at home or in a small office setting. Authentication is done via a pre-shared key,
which you must configure on both the clients and the access point. As per the official 802.1 x
standards, no authentication server is required in this mode. Enterprise mode is designed for
large organizations, and it uses an authentication server to centralize the clients' authentication
credentials.
4. WPA2
The Wi-Fi Alliance's implementation of IEEE 802.11i is known as WPA2. Instead of
WEP, which employs the insecure RC4 encryption algorithm, the Advanced Encryption
Standard (AES)–counter mode CBC-MAC Protocol (CCMP) is employed.
Lesson 4. Setting up a wireless network
A wireless router and a wireless network interface card are required to set up a wireless
network. The wireless router is the brains of the wireless network. Like a wire-based network,
the hub is a central location that all computers connect to, providing the computers with network
access.
Lesson 5.Setting up wireless router
D-Link Router Setup
The D-Link Router can be configured in a matter of minutes, and after you've done so, your Wi-
Fi connection will be established, and you'll be able to connect to the internet via your D-Link
Router.
Make sure the ethernet wire is connected to the modem or an active data jack is connected to
the ethernet port on the back of your router before proceeding.
Follow these steps to set up your D-Link Router –
1. Power on your D-Link Router.
2. Connect your PC to the router using an Ethernet Cable or WiFi.
3. Once your PC is connected, open a web browser and go
to http://192.168.0.1 or http://192.168.1.1
4. A login page will appear. The default username is admin and the password field is to be
left blank. Click on Log In.
5. Now, you can configure and set up your router using the Internet Connection Setup
Wizard.
6. Under Wireless Setup enter SSID (WiFi Name) and Key (Password).
7. Under WAN Setup choose Connect type: DHCP/PPPoE/Static (You can ask your ISP
about your internet connection and the required details).
8. After you have configured your internet connection, you can then click on Save and
Connect and the router will now connect to the Internet.
9. You can then visit the Wireless Settings and set up your Wi-Fi Network including its
SSID and password.