Wireless Networking

From TRCCompSci - AQA Computer Science
Jump to: navigation, search


Wireless networking is used to wirelessly communicate devices to a network. Data is transmitted using radio waves. The Wi-Fi Alliance establish international standards to allow interoperability and backwards compatibility.



Computer Science Tutor


TRC PowerPoint

Wireless Networking


These are connected by using a WAP (Wireless Access Point), this is a bridge between a wireless network and a wired network. They broadcast a wireless signal which other devices can connect to, all the devices share the bandwidth of the access point. The Access Point is normally connected to a single wired network port. In the home this could be packaged with a router and a network switch, but can also be a stand alone device.

A receiving device called a Wireless Network Interface Card. These can be added to a mobile device or a computer by using either a Wi-Fi dongle or a Wi-Fi PCIe Card. It is the device used to connect to a wireless network, receive and transmit data wirelessly.

A Station is a combination of a device and a wireless networking interface card.

Standards / Technologies

These are a few different types of network technologies. The most common and newest version is 802.11ac but there are different types including 802.11a/b/g/n/ac/ac/ab. Speeds have increased from approximately 11mbps to 500mbps.


Distance affects the signal of the Wi-Fi, if the signal is indoors it can spread to a distance of 50-70m and outdoors it can spread to a distance of 250m. It is weaker indoors because of interference like doors, walls, pipework and microwaves.


Each network is set a SSID (Service Set Identification). This is the name that is associated with a network. When a device is trying to connect to a network, the device will search for a network . and that network will report back with its SSID. Some networks don't broadcast there SSID. This is so that devices can't find the network during a search, they can still connect to the network but they will need to know it exists.

MAC Address

A MAC (Media Access Control) address is a group of hexadecimal digits that contain information about that device that broadcasts data. the first three groups represents the manufacturer (or manufacturer & type of device) and the last three groups represent your actual device.


The purpose of the MAC Address is to uniquely identify your device, any data is sent to the MAC Address at a specific IP Address. Your device may have several MAC Addresses, one for Wi-Fi, one for Bluetooth, and one for NFC.




Computer Science Tutor



Ethernet uses the CSMA/CD protocol which detects if a data collision has occurred, it will stop the transmission on the colliding devices and each will wait a random amount of time before resending.

CSMA/CA actually checks the communication channel is idle before sending any data. This will prevent collisions.



RTS/CTS adds an extra layer onto CSMA/CA, by checking if the receiving machine is ready to receive data. A Request To Send is transmitted, and when ready the receiver will transmit a Clear To Send.


Frequency & Channels

2 different frequencies are used for Wi-Fi, The old Wi-Fi frequency is 2.4Ghz which is what all Wi-Fi capable devices can use. This frequency has become very crowded and is used by other technology such as microwaves etc.

A new frequency as been approved, the 5Ghz frequency cannot be accessed by older devices which only support the 2.4Ghz frequency. The main benefit of this is that not many devices use this new technology so that means that there wont be as much interference hence better speeds.

The 2.4Ghz frequency is broken up into approximately 12 channels that can be used, and the 5Ghz frequency is broken up into more channels and in Europe 27 channels are usable. Channels are required because different wireless networks can overlap, and by using a different channel different wireless networks can operate.

720px-2 4 GHz Wi-Fi channels (802 11b,g WLAN) svg.png

However the image above shows how the channels on the 2.4Ghz frequency can interfere with each other. Having adjacent channels is never a good idea because too much interference is generated, there should always be atleast 2 channels in between.

In the home situation your wireless router creates a Wi-Fi network which overlaps with the wireless network next door or even from across the road. Imagine the situation in densely populated areas such has the Centre of London or Manchester.

Wireless Network Security

There are many different ways that you can secure a network.

  • Change the default SSID to your own
  • Hide the SSID
  • Create a whitelist to only allow certain devices to connect to the network
  • Secure the network with a password using WPA/WPA2


WPA or Wi-Fi Protected Access is a protocol that secures a Wi-Fi network. It was developed by the Wi-Fi Alliance to secure wireless networks. WPA was rolled out in 2003 and then WPA2 was introduced in 2004 improving upon WPA.

It replaced WEP which used a single key for all data packets, however WPA/WPA2 use a different key for each packet.

Revision Questions

1. What hardware component does each device need to be able to be connected to a wireless network?


2. What is a station composed of in terms of wireless networking?

A table.
A device.
An ethernet cable.
"Wireless networking"
Wireless Access Point
Incorrect, a WAP allows other devices to connect to the network
A network interface card
Correct. A NIC allows for a device to connect to networks

3. What does SSID stand for?

Salad Sub including Daikon
Solid State identification
Service set identifier
Super Safe Intercredible Democracy

4. What is the role of the SSID:

Name given to the router
correct answer
Allows access to router when there are multiple devices
Wrong answer
Displays when scanned by a device
Correct answer
2.4ghz has 27 channels and 5ghz has 12 channels.
5ghz has 27 channels in europe and 2.4ghz has 12 channels.
5ghz has 26 channels in the uk and 2.4ghz has 13 channels.
2.4ghz has 27 channels and 5ghz has 13 channels.
2ghz has 12 channels and 5ghz has 27 channels in america.

5. what does RTS stand for?

Real time strategy
Royal Television Society
Request to send
Rich Taxes (are) Stupid

6. what does CTS stand for?

Clear time strategy
Central Television Society
Clear to send
Corporation Taxes (are) Stupid

7. Which one of these would make a network more secure?

Use a MAC address whitelist.
Correct answer.
Change and remove SSID from being shared.
Correct answer.
Correct answer.
Wrap the network in bubble wrap.
The correct answer were the other three answers.

8. Which are the benefits of WPA/WPA2 over WEP?

WEP typically uses a lower bit key, WPA/WPA2 uses a higher bit key .
Correct answer.
In WEP the key is constant, WPA/WPA2 generates a key for each packet.
Correct answer.
WPA/WPA2 uses lower bit key, WEP uses a higher bit key.
The correct answers were WEP typically uses a lower bit key, WPA/WPA2 uses a higher bit key, in WEP the key is constant, WPA/WPA2 generates a key for each packet.
In WPA/WPA2 the key is constant, WEP generates a key for each packet.
The correct answers were WEP typically uses a lower bit key, WPA/WPA2 uses a higher bit key, in WEP the key is constant, WPA/WPA2 generates a key for each packet.

9. Describe the various security measures, other then logging in, that a school or business might have put in place to prevent anyone unauthorised from connecting to the network.

Creating a whitelist to only allow certain devices onto the network
Change the default WNIC to your own
Change the default SSID to your own
Change the default WPA2 to your own
Secure the network using WEP
Secure the network using WPA/WPA2
Hide the SSID

10. What does white listing devices do:

Prevents a specific device/s from accessing the network
wrong answer
Allows a specific device/s to access a network and stops others from accessing
right answer

11. what does disabling SSID broadcasting do?

only allows MAC addresses on a stored list to access
this is MAC address whitelisting
key to packet encrypting
must pre know the network to connect, will not appear; not broadcasted

12. When considering WPA/WPA2 What does a per-packet key entail?

A key split into many packets.
Incorrect. A per packet key has a different key for each packet.
A different key for each packet.
A single key per packet
Incorrect. A per packet key has a different key for each packet.
The key has no packets
Incorrect. A per packet key has a different key for each packet.

Your score is 0 / 0