Wi-Fi is a suite of wireless network protocols developed to connect devices to each other by forming an IP-based Wireless Local Area Network (WLAN).
Wi-Fi is based on the IEEE 802.11 Working Group’s family of standards, which defines both the Physical (PHY) and Medium Access Control (MAC) layers of the protocol stack. These layers manage various low-level operations in a wireless device, such as the transmission and reception of radio signals, data rate, channel access, error control and much more. Adhering to a common and unified set of standards ensures seamless interoperability between devices from different vendors.
Definition
Wireless Local Area Network (WLAN): A computer network that links devices using wireless communication within a limited area. Physical (PHY) layer: The bottom layer of the protocol stack that consists of things like the transceiver. Medium Access Control (MAC) layer: The protocol layer that sits above the PHY and controls the hardware responsible for interaction with the wireless transmission medium.
While the IEEE (Institute of Electrical and Electronics Engineers) drives the development of the Wi-Fi ecosystem through its 802.11 standards, the Wi-Fi Alliance takes care of the other parts. The Wi-Fi Alliance is an association of industry-leaders dedicated to fostering the Wi-Fi brand by certifying devices, ensuring interoperability between different vendors, and promoting the Wi-Fi brand by driving its worldwide adoption.
Wi-Fi terminology
Wi-Fi is built on two main device categories that we will be using in this course: Access Points (APs) and Stations (STAs).
An AP acts as the main central node in the Wi-Fi network, broadcasting a wireless signal to allow other devices (STAs) to connect to the network wirelessly.
An STA is a device that connects wirelessly to the AP to join the Wi-Fi network, using the IEEE 802.11 standards to gain access. Common examples of STAs are mobile phones, tablets, and laptops. Please note that although some literature defines STAs as “any device that has the capability to use the 802.11 protocol”, meaning APs are also classified as STAs, these terms will be mutually exclusive in this course.
When one or more STAs connect to an AP and form a WLAN, it is referred to as an Infrastructure Basic Service Set (BSS). A BSS is the most common scenario when discussing Wi-Fi networks.
Note
While other types of service sets exist, they are out of the scope of this course. Such sets include Independent Basic Service Sets (IBSSs), where STAs connect to each other without an AP, and Extended Service Sets (ESSs), where multiple BSSs form an extended network where STAs can roam across the different coverage areas.
A BSS has a name that is used by STAs during the connection process. This name is referred to as the Service Set Identifier (SSID). The SSID is not a secure way to refer to Wi-Fi networks because it is user-defined and can be altered. An impostor could use the same SSID to deceive STAs into connecting to it instead of the intended AP (known as an evil twin attack). Because of this, BSSs use the MAC address of the AP as another identifier, known as the Basic Service Set Identifier (BSSID). This helps STAs to connect to the desired AP when there are multiple APs with the same SSID:
Definition
Access Point (AP): A device that connects to a wired network and broadcasts a wireless signal. Station (STA): A device that connects to a wireless network and communicates with the AP. Infrastructure Basic Service Set (BSS): The most basic form of a WLAN with an AP and one or more STAs. Service Set Identifier (SSID): A user-defined name for a Wi-Fi network. Basic Service Set identifier (BSSID): The MAC address of the AP.
Device joining procedure
An STA is responsible for initiating the procedure to connect to an AP. The procedure has three main steps:
Discovery
Authentication
Association
The STA needs to know if there are APs it can connect to. This discovery can be done using either active or passive scanning.
With passive scanning, the STA listens on each frequency channel for beacons sent out periodically by APs. After the STA has scanned all its supported channels, it has populated a scan results list with all the beacons it has taken record of.
Conversely, in active scanning, the Wi-Fi station does not wait for beacons from APs and instead transmits a probe request, probing for available APs nearby. Normally, requests are sent to the broadcast address and received by all APs in range. Optionally, the STA can probe for a certain AP by including its SSID. This kind of probe is called a directed probe request.
Unless certain privacy measures are implemented, any AP listening to a broadcasted probe request replies with a probe response that the STA uses to populate a scan results list of the APs.
After discovery, the STA can choose to initiate a connection procedure to an AP. It sends an authentication request, and the AP responds with an authentication response. Note that this authentication procedure will look different depending on the security method used.
After the response, the STA sends an association request, which includes its supported 802.11 capabilities, such as supported data rates, channels, and security protocols. If the AP chooses to accept the connection, it sends back an association response.
Then, depending on if security was requested, a security procedure is performed between the devices.
Wi-Fi device joining
Data transfer over 802.11
Once the 802.11 connection is successfully established and the device has an IP address, data transfer can now take place between the AP and the STA over the Wi-Fi network. Data in Wi-Fi is sent over 802.11 frames, commonly containing IP packets. However, one can use any other data protocol as well.
When an AP receives an 802.11 frame, it inspects the destination address to check if the packet is intended for an STA in the same Wi-Fi network, or a remote device on the internet. If the packet is intended for a device on the same network, the AP routes it accordingly, and if it is intended for an external device, the AP routes the packet to the internet.
Broadcast, multicast, and unicast
Wi-Fi supports three main forms of traffic, namely: broadcast, multicast, and unicast traffic.
Wi-Fi supported traffic formats
Unicast traffic refers to a data stream being sent from a sender to a single receiver. Unicast traffic requires a unique destination address and is the most reliable transmission method, as the receiver must acknowledge the packet. It is also the form of traffic that generates the least network load, has the least latency, and is the most secure. E-mail exchange is a common example of unicast traffic.
Multicast traffic refers to a data stream being sent from a sender to multiple receivers, using a special multicast address. Multicast transmissions can be an efficient way of delivering the same message to multiple recipients. A common use of multicast is to discover devices locally on the network, such as printers, smart speakers, and smart home products.
Broadcast traffic refers to a data stream being sent from an AP to all STAs registered with it, using a unique broadcast address. This form of traffic is commonly used for network joining and maintenance, for example, when an AP needs to broadcast a certain parameter change in the network.
If you are sending a message to multiple devices, this can be done by sending a unicast message to each device or through one multicast transmission. In this case, a single multicast transmission can also be used to decrease signaling and overhead traffic over the network.
It is good practice to limit broadcast transmissions unless strictly needed, as it causes the most congestion over the network.
Frequency bands and Wi-Fi radio channels
The 802.11 standards specify Wi-Fi radios to use multiple frequency bands, including but not limited to, sub-1 GHz, 2.4 GHz, 3.65 GHz, 5 GHz, and 6 GHz. However, local regulations in each country or region limit which of these frequency bands Wi-Fi devices can use. This leads to Wi-Fi devices mostly operating in one of two unlicensed frequency bands: the 2.4 GHz band, commonly referred to as the Industrial Scientific and Medical (ISM) band and the newer 5 GHz band.
Unlike many other wireless protocols, Wi-Fi does not commonly use any frequency hopping multiple access schemes. Therefore, the choice of the frequency band and RF channel to operate on is key to ensuring good system performance.
Differences between the 2.4 GHz and 5 GHz bands
The 2.4 GHz ISM band is the most commonly used unlicensed frequency band, including by other technologies. It includes a total of 14 RF channels, each with a bandwidth of 20 MHz and a separation of only 5 MHz. Since the 2,4 GHz band only spans 100 MHz, most of the 14 RF channels are overlapping. In fact, only three channels, 1,6 and 11, are non-overlapping channels and are consequently the most commonly used.
In addition, channel bonding makes it possible to utilize 40 MHz bandwidth, but due to channel overlap, this can only be done on two channels that don’t overlap.
Channels in the 2,4 GHz band
Note
The exact number of channels available for you might vary due to local regulations. For example, in North America, only 11 of these 14 channels are allowed, while in Europe 13 channels are allowed.
Because it is so widely used by different technologies, the ISM band can suffer from congestion and interference, but it provides good range and obstacle penetration due to its lower frequency. The range and penetration make it suitable for larger areas or environments with many signal obstructions. The 5 GHz band has been specified for Wi-Fi devices to off-load the ISM band.
The 5 GHz band brings different advantages to Wi-Fi radios. Such as:
The 5 GHz band generally suffers from less congestion than the 2.4 GHz band.
The 5 GHz band itself is broader than the 2.4 GHz band, providing more non-overlapping RF channels to choose from.
This makes it well-suited for environments requiring high-speed data transfer or having many devices connected simultaneously. However, this also comes with its drawbacks, as the 5 GHz band uses a higher frequency, which attenuates and is absorbed by obstacles more easily. Devices using the 5 GHz band also consume more power due to the higher throughput and have less coverage due to the increased signal attenuation.
The choice of Wi-Fi band will depend on your application’s specific needs and environment. If long-range and good obstacle penetration is needed, then the 2.4 GHz band is the way to go. However, if the application dictates high speeds, multiple simultaneous transmissions, or will be deployed in a crowded area, then the 5 GHz band is a better option.
Nordic Developer Academy Privacy Policy
1. Introduction
In this Privacy Policy you will find information on Nordic Semiconductor ASA (“Nordic Semiconductor”) processes your personal data when you use the Nordic Developer Academy.
References to “we” and “us” in this document refers to Nordic Semiconductor.
2. Our processing of personal data when you use the Nordic Developer Academy
2.1 Nordic Developer Academy
Nordic Semiconductor processes personal data in order to provide you with the features and functionality of the Nordic Developer Academy. Creating a user account is optional, but required if you want to track you progress and view your completed courses and obtained certificates. If you choose to create a user account, we will process the following categories of personal data:
Email
Name
Password (encrypted)
Course progression (e.g. which course you have completely or partly completed)
Certificate information, which consists of name of completed course and the validity of the certificate
Course results
During your use of the Nordic Developer Academy, you may also be asked if you want to provide feedback. If you choose to respond to any such surveys, we will also process the personal data in your responses in that survey.
The legal basis for this processing is GDPR article 6 (1) b. The processing is necessary for Nordic Semiconductor to provide the Nordic Developer Academy under the Terms of Service.
2.2 Analytics
If you consent to analytics, Nordic Semiconductor will use Google Analytics to obtain statistics about how the Nordic Developer Academy is used. This includes collecting information on for example what pages are viewed, the duration of the visit, the way in which the pages are maneuvered, what links are clicked, technical information about your equipment. The information is used to learn how Nordic Developer Academy is used and how the user experience can be further developed.
2.2 Newsletter
You can consent to receive newsletters from Nordic from within the Nordic Developer Academy. How your personal data is processed when you sign up for our newsletters is described in the Nordic Semiconductor Privacy Policy.
3. Retention period
We will store your personal data for as long you use the Nordic Developer Academy. If our systems register that you have not used your account for 36 months, your account will be deleted.
4. Additional information
Additional information on how we process personal data can be found in the Nordic Semiconductor Privacy Policy and Cookie Policy.
Nordic Developer Academy Terms of Service
1. Introduction
These terms and conditions (“Terms of Use”) apply to the use of the Nordic Developer Academy, provided by Nordic Semiconductor ASA, org. nr. 966 011 726, a public limited liability company registered in Norway (“Nordic Semiconductor”).
Nordic Developer Academy allows the user to take technical courses related to Nordic Semiconductor products, software and services, and obtain a certificate certifying completion of these courses. By completing the registration process for the Nordic Developer Academy, you are agreeing to be bound by these Terms of Use.
These Terms of Use are applicable as long as you have a user account giving you access to Nordic Developer Academy.
2. Access to and use of Nordic Developer Academy
Upon acceptance of these Terms of Use you are granted a non-exclusive right of access to, and use of Nordic Developer Academy, as it is provided to you at any time. Nordic Semiconductor provides Nordic Developer Academy to you free of charge, subject to the provisions of these Terms of Use and the Nordic Developer Academy Privacy Policy.
To access select features of Nordic Developer Academy, you need to create a user account. You are solely responsible for the security associated with your user account, including always keeping your login details safe.
You will able to receive an electronic certificate from Nordic Developer Academy upon completion of courses. By issuing you such a certificate, Nordic Semiconductor certifies that you have completed the applicable course, but does not provide any further warrants or endorsements for any particular skills or professional qualifications.
Nordic Semiconductor will continuously develop Nordic Developer Academy with new features and functionality, but reserves the right to remove or alter any existing functions without notice.
3. Acceptable use
You undertake that you will use Nordic Developer Academy in accordance with applicable law and regulations, and in accordance with these Terms of Use. You must not modify, adapt, or hack Nordic Developer Academy or modify another website so as to falsely imply that it is associated with Nordic Developer Academy, Nordic Semiconductor, or any other Nordic Semiconductor product, software or service.
You agree not to reproduce, duplicate, copy, sell, resell or in any other way exploit any portion of Nordic Developer Academy, use of Nordic Developer Academy, or access to Nordic Developer Academy without the express written permission by Nordic Semiconductor. You must not upload, post, host, or transmit unsolicited email, SMS, or \”spam\” messages.
You are responsible for ensuring that the information you post and the content you share does not;
contain false, misleading or otherwise erroneous information
infringe someone else’s copyrights or other intellectual property rights
contain sensitive personal data or
contain information that might be received as offensive or insulting.
Such information may be removed without prior notice.
Nordic Semiconductor reserves the right to at any time determine whether a use of Nordic Developer Academy is in violation of its requirements for acceptable use.
Violation of the at any time applicable requirements for acceptable use may result in termination of your account. We will take reasonable steps to notify you and state the reason for termination in such cases.
4. Routines for planned maintenance
Certain types of maintenance may imply a stop or reduction in availability of Nordic Developer Academy. Nordic Semiconductor does not warrant any level of service availability but will provide its best effort to limit the impact of any planned maintenance on the availability of Nordic Developer Academy.
5. Intellectual property rights
Nordic Semiconductor retains all rights to all elements of Nordic Developer Academy. This includes, but is not limited to, the concept, design, trademarks, know-how, trade secrets, copyrights and all other intellectual property rights.
Nordic Semiconductor receives all rights to all content uploaded or created in Nordic Developer Academy. You do not receive any license or usage rights to Nordic Developer Academy beyond what is explicitly stated in this Agreement.
6. Liability and damages
Nothing within these Terms of Use is intended to limit your statutory data privacy rights as a data subject, as described in the Nordic Developer Academy Privacy Policy. You acknowledge that errors might occur from time to time and waive any right to claim for compensation as a result of errors in Nordic Developer Academy. When an error occurs, you shall notify Nordic Semiconductor of the error and provide a description of the error situation.
You agree to indemnify Nordic Semiconductor for any loss, including indirect loss, arising out of or in connection with your use of Nordic Developer Academy or violations of these Terms of Use. Nordic Semiconductor shall not be held liable for, and does not warrant that (i) Nordic Developer Academy will meet your specific requirements, (ii) Nordic Developer Academy will be uninterrupted, timely, secure, or error-free, (iii) the results that may be obtained from the use of Nordic Developer Academy will be accurate or reliable, (iv) the quality of any products, services, information, or other material purchased or obtained by you through Nordic Developer Academy will meet your expectations, or that (v) any errors in Nordic Developer Academy will be corrected.
You accept that this is a service provided to you without any payment and hence you accept that Nordic Semiconductor will not be held responsible, or liable, for any breaches of these Terms of Use or any loss connected to your use of Nordic Developer Academy. Unless otherwise follows from mandatory law, Nordic Semiconductor will not accept any such responsibility or liability.
7. Change of terms
Nordic Semiconductor may update and change the Terms of Use from time to time. Nordic Semiconductor will seek to notify you about significant changes before such changes come into force and give you a possibility to evaluate the effects of proposed changes. Continued use of Nordic Developer Academy after any such changes shall constitute your acceptance of such changes. You can review the current version of the Terms of Use at any time at https://academy.nordicsemi.com/terms-of-service/
8. Transfer of rights
Nordic Semiconductor is entitled to transfer its rights and obligation pursuant to these Terms of Use to a third party as part of a merger or acquisition process, or as a result of other organizational changes.
9. Third Party Services
To the extent Nordic Developer Academy facilitates access to services provided by a third party, you agree to comply with the terms governing such third party services. Nordic Semiconductor shall not be held liable for any errors, omissions, inaccuracies, etc. related to such third party services.
10. Dispute resolution
The Terms of Use and any other legally binding agreement between yourself and Nordic Semiconductor shall be subject to Norwegian law and Norwegian courts’ exclusive jurisdiction.