Open In App

Wireless Principles in CCNA

Last Updated : 12 Dec, 2022
Improve
Improve
Like Article
Like
Save
Share
Report

Wireless communication takes place over free space over RF (Radio Frequency), where one device (transmitter) sends a signal to another device (receiver). Two devices (transmitter and receiver) must use the same frequency (or channel) to communicate with each other. Radio frequencies can cause interference when many wireless devices communicate at the same time. As the number of devices increases, the interference increases. The following topics describe the concept of wireless principles in CCNA.

wireless principles in CCNA

 

Non-Overlapping Wi-Fi channels:

Data is typically sent between two devices during a wireless connection. More devices can join in sharing the medium for data exchanges on a wireless LAN. To transfer data from one device to another, a wireless LAN needs to emit a signal using radio frequencies (RF). In addition to being mobile and free to roam about, transmitters and receivers can also be fixed in specific areas. Our wireless network’s ability to transmit and receive data across a Wi-Fi channel. While the 5 GHz frequency contains 45 channels, the 2.4 GHz band only has 11. Your Wi-Fi coverage and performance can be greatly enhanced by choosing the appropriate Wi-Fi channel. The only non-overlapping channels in the 2.4 GHz frequency are channels 1, 6, and 11. A crucial step in successfully configuring your network is deciding on one or more of these channels.

SSID:

Service Set Identifier is referred to as SSID. The name of the Wi-Fi network is SSID. An SSID is a 32-character unique ID that is used to identify wireless networks. SSIDs ensure that data is routed to the proper spot when several wireless networks coexist in the same area. The network is connected to a MAC address on the AP. A service set identifier is what your clients use to connect to this network or workgroup (SSID). Therefore, the SSID on the AP is a mashup of the MAC address and network name. This MAC address may be a different MAC address created on the AP or wireless radio. A Basic Service Set Identifier is used to describe an AP that only provides service to one network (BSSID). The option to use multiple SSIDs is provided by APS. This will enable you to use the same AP while providing both a Guest Network and a Corporate Network. Multiple Basic Service Set Identifiers are used when an AP has multiple networks (MBSSID). Despite serving a number of networks, it is the same hardware. Users on one network share with users on another because the hardware and frequency range are the same, and if they communicate at the same time, they may clash.

RF (Radio Frequency):

Transmission of data is carried out using radio frequencies (RF) in wireless communications. The electromagnetic spectrum contains different radio frequency bands dedicated to different services. Digital cordless phones, personal digital assistants, laptops, pagers, Personal Computer Memory Card International Association (PCMCIA), and other devices operate in the 800 MHz to 2.5 GHz portion of the electromagnetic spectrum. Radiofrequency (RF) signals are used in transmission from one device (transmitter) to another (receiver) through open space. As long as both devices are set to the same frequency (or channel) and communicate using the same protocol, the transmitter, and receiver can always be in communication with one another. An electrical signal is applied at one end and carried to the other end of a wired link to transmit data across it. The signal can spread quite easily because the wire is continuous and conductive. There are no physical cables or other means of signal transmission in a wireless link.

Encryption:

Applying a certain algorithm to data in order to change how it appears and render it confusing to others without access. Datagram Transport Layer Security (DTLS) keeps packets secure when data encryption is enabled for an AP. Various authentication mechanisms are used during the identification procedure. Security features like frame authentication and encryption are used to protect wireless data. The data must be encrypted on a wireless network to ensure data privacy. This is achieved by encrypting the payload of the data in each wireless frame right before transmission and decrypting it upon reception. The goal is to successfully encrypt and decrypt the data by employing an encryption technique that both the transmitter and receiver can use. All clients must associate using the same encryption method because each WLAN in wireless networks may only allow one authentication and encryption methodology. In order for the AP and a client to interpret each other’s data, they should be the only two devices that share the encryption keys. No device should be aware of the keys or be able to use them to intercept and decode the data.


Like Article
Suggest improvement
Previous
Next
Share your thoughts in the comments

Similar Reads