Loading learning content...
Walk into any modern office, coffee shop, airport, or home, and you'll witness an invisible revolution that has fundamentally transformed how humanity connects. Wireless Local Area Networks (WLANs) have liberated computing from the constraints of physical cables, enabling seamless connectivity that our ancestors—even those from just three decades ago—would consider magical.
But this magic comes at a price. The very characteristics that make wireless networking liberating also introduce a constellation of engineering challenges that wired networks never face. Radio waves don't respect walls. They fade over distance. They interfere with each other. They can be eavesdropped upon by anyone with an antenna. Understanding these characteristics isn't just academic—it's the foundation upon which all wireless network design, troubleshooting, and security decisions rest.
By the end of this page, you will possess a deep understanding of WLAN characteristics—from the fundamental physics of radio propagation to the engineering compromises that shape every WiFi network. You'll understand why wireless networks behave differently from their wired counterparts and how these differences influence every aspect of network design.
At its core, wireless communication relies on electromagnetic radiation—specifically, radio waves in the frequency bands allocated for WiFi communication. Unlike wired communication, where electrical signals travel through a guided medium (copper cables) or light pulses traverse fiber optics, wireless signals propagate through the air, walls, and even space itself.
The Medium is the Message (and the Problem):
In wired Ethernet, the transmission medium is a dedicated, controlled cable connecting exactly two endpoints. The signal quality is predictable, interference is minimal, and the channel is essentially private. Wireless communication inverts every one of these assumptions:
Unlike a cable that creates a point-to-point link, a radio transmission is inherently a broadcast. When an access point transmits a frame, every device within range receives it. This fundamental characteristic drives many design decisions in 802.11, from the need for MAC-layer acknowledgments to the critical importance of encryption.
| Characteristic | Wired (Ethernet) | Wireless (WLAN) |
|---|---|---|
| Medium | Dedicated cable per link | Shared radio spectrum |
| Signal Propagation | Guided, predictable | Unguided, variable |
| Interference | Minimal, controlled | Significant, uncontrollable |
| Privacy | Physical access required | Any receiver in range |
| Bandwidth | Dedicated per link | Shared among all devices |
| Distance Impact | Minimal (within spec) | Significant degradation |
| Duplex Mode | Full duplex possible | Half duplex only |
| Collision Detection | CSMA/CD works | CSMA/CD impossible |
Understanding how radio waves behave in the real world is essential for anyone designing, deploying, or troubleshooting wireless networks. Radio propagation is governed by physics, and these physical laws create both opportunities and constraints for WLAN design.
Path Loss: The Inevitable Fading
As radio waves travel from transmitter to receiver, their power decreases according to the inverse square law. In free space, signal power decreases proportionally to the square of the distance. Double the distance, and you receive only one-quarter of the power. In practical indoor environments, the attenuation is often worse—following an inverse cube or even inverse fourth-power relationship due to additional losses from obstacles.
The Free Space Path Loss Formula:
FSPL (dB) = 20 × log₁₀(d) + 20 × log₁₀(f) + 20 × log₁₀(4π/c)
Where:
This formula reveals a crucial insight: higher frequencies experience greater path loss. This is why 5 GHz WiFi networks have shorter range than 2.4 GHz networks, despite often providing higher data rates.
In indoor environments, the signal reaches the receiver via multiple paths—direct line-of-sight plus numerous reflections. These copies arrive at slightly different times, potentially interfering with each other destructively. Modern WiFi (802.11n and later) uses MIMO technology to actually exploit multipath, but understanding this phenomenon remains crucial for network design.
Attenuation Through Materials:
Different materials attenuate radio signals to varying degrees. Understanding these values helps predict coverage and plan access point placement:
| Material | Attenuation (dB) | Practical Impact |
|---|---|---|
| Drywall/Plasterboard | 3-5 dB | Minimal; signals pass through easily |
| Wooden Door | 3-4 dB | Minimal impact on coverage |
| Glass Window (Standard) | 2-3 dB | Negligible in most scenarios |
| Glass Window (Low-E Coated) | 10-15 dB | Significant; common in modern buildings |
| Brick Wall | 6-10 dB | Moderate; may require multiple APs |
| Concrete Wall (Thin) | 10-15 dB | Significant; often blocks 5 GHz completely |
| Concrete Wall (Thick/Reinforced) | 15-25 dB | Severe; typically blocks signals |
| Metal Door/Wall | 20-30+ dB | Near-complete blockage |
| Elevator Shaft | 30+ dB | Complete isolation; acts as Faraday cage |
One of the most misunderstood aspects of wireless networking is the relationship between advertised data rates and actual achievable throughput. Marketing materials proclaim speeds like "WiFi 6: Up to 9.6 Gbps!" while users struggle to get 100 Mbps in practice. This isn't deception—it's physics and protocol design.
The Bandwidth Reality:
Wireless bandwidth is fundamentally shared. Unlike a switch port that provides dedicated bandwidth to each connected device, an access point's radio capacity is divided among all associated stations. When the marketing claims "up to 1200 Mbps," that's the total capacity—split among every device connected.
Factors That Consume Wireless Capacity:
As a rough heuristic, expect actual TCP throughput to be approximately 50-60% of the raw PHY rate under ideal conditions, and significantly less under real-world conditions with multiple clients, interference, and non-ideal positioning. A device connecting at "300 Mbps" might achieve 150 Mbps under ideal conditions and 50-100 Mbps in practice.
Rate Adaptation: The Dynamic Dance
Wireless devices continuously adjust their transmission rate based on channel conditions. This process, called rate adaptation or link adaptation, is crucial for maintaining connectivity:
This adaptive behavior means that a device's connection speed varies constantly. The "signal bars" on your phone represent signal strength, not speed—a device might have full bars but connect at a low rate due to interference, or have few bars but maintain a reasonable rate in a quiet RF environment.
| Data Rate Tier | Modulation | Signal Quality Required | Typical Range (Indoor) |
|---|---|---|---|
| Low (1-11 Mbps) | BPSK/QPSK/CCK | Weak signal acceptable | ~100+ meters |
| Medium (12-54 Mbps) | OFDM (16-QAM) | Moderate signal required | ~50-80 meters |
| High (65-300 Mbps) | OFDM (64-QAM) + MIMO | Good signal required | ~25-50 meters |
| Very High (400+ Mbps) | OFDM (256-QAM+) + MIMO | Excellent signal required | ~10-25 meters |
One of the most significant characteristics distinguishing WLANs from wired Ethernet is their half-duplex nature. A wireless station cannot transmit and receive at the same time. This isn't a design choice—it's a fundamental physical constraint with far-reaching implications.
Why Half-Duplex is Unavoidable:
In a wired network with separate transmit and receive pairs, full-duplex communication is straightforward. But consider a wireless radio:
The transmitter overpowers the receiver: A typical WiFi transmission at 100 mW is about 10^12 times more powerful than the minimum signal a receiver can detect. If the transmitter and receiver operate simultaneously, the transmit signal completely overwhelms any received signal.
Shared antenna: Most WiFi devices use a single antenna (or antenna array) for both transmission and reception. The antenna can only be in one mode at a time.
Shared medium: Even with separate antennas, the radio waves share the same medium. Transmitting while receiving would be like trying to listen to someone whisper while you're shouting.
Implications for Network Design:
Researchers are actively developing self-interference cancellation techniques that could enable full-duplex wireless. By subtracting the known transmitted signal from the received signal, future WiFi might achieve bidirectional simultaneous communication. However, this technology remains experimental and isn't yet in commercial products.
The Protocol Impact:
Half-duplex operation fundamentally shapes the 802.11 MAC layer. Consider the sequence for transmitting a single frame:
Every single frame incurs this overhead. In contrast, wired Ethernet can transmit continuously in both directions with minimal protocol overhead. This is why, despite impressive raw speeds, WiFi often feels slower than wired connections for interactive applications.
WLANs operate in unlicensed spectrum—frequency bands that anyone can use without a regulatory license. The primary WiFi bands (2.4 GHz and 5 GHz) are shared with an enormous variety of other devices and technologies. This creates a challenging RF environment that network designers must navigate.
Sources of Interference:
| Interference Source | Affected Band | Interference Pattern | Mitigation |
|---|---|---|---|
| Microwave Ovens | 2.4 GHz | Periodic, high-power bursts during operation | Use 5 GHz; position APs away from kitchens |
| Bluetooth Devices | 2.4 GHz | Frequency hopping across band | 802.11 and Bluetooth coexist reasonably; 5 GHz avoids entirely |
| Cordless Phones (older) | 2.4 GHz / 5.8 GHz | Continuous when in use | Replace with DECT phones; use alternate bands |
| Baby Monitors | 2.4 GHz | Continuous transmission | Channel selection; 5 GHz |
| Wireless Cameras | 2.4 GHz | Continuous video stream | Coordinate channels; separate frequency bands |
| Neighboring WiFi Networks | Both bands | Continuous, overlapping | Channel planning; use DFS channels |
| Radar Systems | 5 GHz (DFS channels) | Periodic pulses | DFS avoids automatically; use non-DFS channels in sensitive areas |
| ZigBee/Z-Wave IoT | 2.4 GHz (ZigBee) | Low duty cycle but additive | Channel coordination with IoT deployments |
Co-Channel Interference (CCI):
The most significant interference source for enterprise WLANs is typically other WiFi networks—including your own. When multiple access points use the same channel, they hear each other's transmissions. This causes:
The 2.4 GHz Channel Problem:
The 2.4 GHz band provides only three non-overlapping channels (1, 6, 11 in North America). In dense deployments, there simply aren't enough channels to give each access point its own. This leads to intentional co-channel interference that must be carefully managed through power control and client steering.
Adjacent Channel Interference (ACI):
Even access points on different channels can interfere if their signals overlap in frequency or are simply very strong. In the 2.4 GHz band, using channels 1, 4, and 8 (for example) creates adjacent channel interference that's actually worse than just accepting co-channel interference on channels 1, 6, and 11.
In environments like apartment buildings, conference centers, or stadiums, dozens or hundreds of WiFi networks compete for limited spectrum. This creates a tragedy of the commons where everyone's performance suffers. There is no technical solution—only careful planning, 5 GHz utilization, and emerging standards like WiFi 6's OFDMA that improve spectral efficiency.
The broadcast nature of radio communication creates inherent security challenges that don't exist in wired networks. Every frame transmitted over WiFi can potentially be captured by any receiver within range—including attackers. This fundamental characteristic demands that security be engineered into wireless networks from the ground up.
The Eavesdropping Reality:
Unlike wired networks where physical access is required to tap communications, wireless signals propagate beyond the intended coverage area. An attacker can:
Attack Surfaces Unique to Wireless:
Given the inherent exposure of wireless communications, robust WLAN security requires multiple layers: strong encryption (WPA3), proper authentication (802.1X/EAP), network segmentation, rogue AP detection, and client security practices. No single measure is sufficient.
Management Frame Vulnerability:
Historically, 802.11 management frames (beacons, probe responses, authentication, association) were transmitted unencrypted and unauthenticated. This allowed trivial spoofing of deauthentication frames to disconnect any client. 802.11w (Protected Management Frames), now mandatory in WPA3, addresses this by cryptographically protecting management frames, but adoption remains incomplete.
Physical Layer Vulnerabilities:
Even below the MAC layer, wireless networks exhibit characteristics that aid attackers:
Perhaps the most compelling characteristic of WLANs is mobility—the ability to maintain network connectivity while physically moving. This wasn't possible with wired networks and fundamentally changes how humans interact with technology. However, seamless mobility requires careful engineering to overcome the inherent discontinuities of wireless communication.
The Roaming Challenge:
As a user moves through a building, they move away from one access point and closer to another. At some point, the client device must switch its association from the old AP to the new one. This process—roaming—must happen quickly enough that applications don't notice.
Roaming Stages:
Discovery — The client must identify candidate APs to roam to. This can be passive (listen for beacons) or active (send probe requests). Discovery can take 100-500ms if done naively.
Authentication — The client must authenticate with the new AP. With WPA2-Enterprise, this might involve full 802.1X/EAP exchange taking 500ms or more.
Association — The client formally associates with the new AP and negotiates capabilities.
Key Establishment — For encrypted networks, fresh keys must be established (4-way handshake).
IP Continuity — If the new AP is in a different subnet, the client may need a new IP address, breaking existing connections.
| Application Type | Maximum Acceptable Roam Time | Consequence of Slow Roaming |
|---|---|---|
| VoIP (802.11r) | < 50 ms | Audio dropout, call disconnect |
| Video Conferencing | < 150 ms | Visible freeze, audio hiccup |
| Interactive Applications | < 300 ms | Noticeable pause, transaction timeout |
| Web Browsing | < 1000 ms | Page load delays |
| Background Sync | < 5000 ms | Sync interruption, retry |
Standards like 802.11r (Fast BSS Transition), 802.11k (Radio Resource Measurement), and 802.11v (Wireless Network Management) work together to enable seamless roaming. 802.11r pre-caches authentication credentials at neighboring APs, reducing roam time from seconds to under 50ms. These are essential for VoIP and real-time applications.
Client Roaming Decision:
Interestingly, the decision to roam rests entirely with the client device, not the network. This creates challenges:
802.11v allows the network to suggest that a client roam (BSS Transition Management), but the client can ignore this suggestion. True network-controlled roaming remains elusive.
Layer 3 Mobility:
Roaming between APs in the same subnet is relatively straightforward—the client keeps its IP address and only the Layer 2 connection changes. But roaming between subnets requires obtaining a new IP address, breaking all existing connections. Solutions like:
...address this problem with varying tradeoffs.
We've explored the fundamental characteristics that define Wireless LANs and distinguish them from their wired counterparts. These aren't merely interesting facts—they're the foundation upon which all wireless network design decisions rest.
You now understand the fundamental characteristics that make WLANs both powerful and challenging. These characteristics inform every aspect of wireless networking—from protocol design to security measures to deployment strategies. Next, we'll explore the IEEE 802.11 family of standards that implement WiFi, building on this foundation of understanding.
What's Next:
With a solid understanding of WLAN characteristics, we're prepared to explore how these principles are codified in the IEEE 802.11 standard family. The next page covers the evolution of WiFi standards from 802.11-1997 through the latest WiFi 6E (802.11ax), examining how each generation addressed the challenges we've discussed while unlocking new capabilities.