Wi-Fi Fundamentals

Changing the version will not affect your certificate
Lesson 1 – Introduction to Wi-Fi
5 Topics | 1 Quiz
What is Wi-Fi?
Key features of Wi-Fi 6
Security in Wi-Fi
nRF70 Series
Exercise 1 – Provisioning a Wi-Fi device over the phone
Lesson 1 quiz
Lesson 2 – Connecting to Wi-Fi
5 Topics | 1 Quiz
Network Management API
Wi-Fi Provisioning
Exercise 1 – Connecting to Wi-Fi using the Wi-Fi shell
Exercise 2 – Connecting to Wi-Fi using the Network Management API
Exercise 3 – Provisioning the device over Bluetooth LE
Lesson 2 quiz
Lesson 3 – Networking & sockets
4 Topics | 1 Quiz
Network protocol stack
Socket API
Exercise 1 – Pinging an echo server
Exercise 2 – Measuring the throughput of a Wi-Fi connection
Lesson 3 quiz
Lesson 4 – MQTT over Wi-Fi
4 Topics | 1 Quiz
MQTT protocol
MQTT library
Exercise 1 – Connecting to an MQTT broker
Exercise 2 – Securing the MQTT connection with TLS
Lesson 4 quiz
Lesson 5 – HTTP over Wi-Fi
5 Topics | 1 Quiz
HTTP protocol
HTTP library
Exercise 1 – Connecting to an HTTP server
Exercise 2 – Adding TLS to the HTTP connection
Exercise 3 – Setting up an HTTP Server
Lesson 5 quiz
Lesson 6 – Power save modes
5 Topics | 1 Quiz
Beacon frames: TIM and DTIM
Power save modes
Target Wake Time
Exercise 1 – Enabling power save modes
Exercise 2 – (Optional) Enabling TWT with notification
Lesson 6 quiz
Get your Certificate!
Feedback
Feedback

If you are having issues with the exercises, please create a ticket on DevZone: devzone.nordicsemi.com
Drag & Drop Files, Choose Files to Upload You can upload up to 2 files.
Loading
RegisterLog in

Network protocol stack

As we saw in Lesson 1, the actual Wi-Fi protocol stack consists of the lower two layers, MAC and PHY, running on the nRF70 Series interacting with the Wi-Fi host stack running on the host MCU, in our case the nRF5340 SoC.

The host MCU is running all the upper layers needed for network communication. Let’s take a look at the different layers that make up the network protocol stack.

Architecture of host MCU

Wi-Fi host stack

The Wi-Fi host stack is the lowest layer running in the host MCU, and is comprised of the Wi-Fi driver and an 802.1X supplicant. It is mainly responsible for interfacing with the Wi-Fi stack running on the nRF70 Series IC.

Definition

Supplicant: Specifically called 802.1X supplicant as defined by the IEEE is an entity, either hardware or software, that seeks to be authenticated by an authenticator attached to the other end of that link.

The Wi-Fi host stack communicates with the nRF70 Series companion IC using the SPI/QSPI interface.

L2

The layer above the Wi-Fi driver contains the L2 network technology responsible for routing the Wi-Fi traffic beyond the Wi-Fi access point.

The Wi-Fi driver presents the nRF70 Series IC as an ethernet interface to the upper layers of the stack.

This is enabled through the Kconfig CONFIG_NET_L2_ETHERNET.

IPv4 and IPv6

The layer above the L2 layer defines the Internet Protocol address (IP address), which essentially provides the location for the IP packet.

The original IP address (IPv4) defines the addresses as 32-bit numbers, but due to the expansion of the Internet, there were too few addresses. As a solution, IPv6 was introduced, which defines the addresses as 128-bit numbers. These two versions are in simultaneous use today.

These are enabled through the Kconfigs CONFIG_NET_IPV4 and CONFIG_NET_IPV6.

TCP and UDP

On top of IPv4 and IPv6, we have the transport layer, which is made up of two communication protocols, the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP).

  • TCP is a connection-oriented protocol that uses a three-way handshake to establish a connection between server and client before beginning to send data. It provides reliable, ordered and error-checked delivery of a stream of bytes.
  • UDP is a connectionless protocol that does not require an established connection, but rather transmits packets (called datagrams) directly to the receiver. As opposed to TCP, this does not provide ordered or error-checked delivery.

Being a simpler protocol, UDP has fewer overhead bits and no handshake. This creates a number of advantages such as the lower power consumption associated with the absence of handshakes. However, this can lead to a higher data loss and packets can arrive out of order but can be solved by the application protocol.

On the other hand, TCP is a more complex protocol. It offers packet awareness, which means that transceivers are aware of the order of packets being sent so any lost packet can be detected and re-transmitted and any disruption in the packet order can be corrected. Of course, this results in increased overhead and power consumption.

TLS and DTLS

On top of TCP and UDP, we have either Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS), which provide security for TCP and UDP, respectively.

  • TLS is an encryption protocol designed to provide security over a TCP connection. When establishing a connection between the server and client, the client can request a TLS connection. One of the main ways of achieving this is to use a different port number for TLS connections.
  • DTLS is an implementation of TLS that is specifically designed to be used over datagram-based communication and is intended to provide similar security guarantees. To do this, DTLS requires a handshake prior to transmitting messages, where each handshake packet has a specific sequence number to solve the fact that UDP does not provide ordered delivery.

The transport layer security protocols provide confidentiality, integrity, and authenticity to the communication.

  • Confidentiality: The communication cannot be read by third parties along the network path.
  • Integrity: The communication cannot be altered by third parties along the network path.
  • Authenticity: Verifies the identity of both sides of the communication (client and server).

From an application perspective, the difference between using TLS and DTLS is insignificant, as both protocols provide the same type of security.

Certificate chain

To verify the authenticity of the server side of the communication, a certificate chain is used.

A certificate chain is a list of certificates used to verify a server’s authenticity. The chain starts from the server’s certificate (often called the identity certificate or end-entity certificate), followed by one or more intermediate certificates, and terminates with a root CA (Certificate Authority) certificate. Each certificate in the chain is signed by the entity identified by the next certificate in the chain.

The figure below illustrates a certificate chain with one intermediate certificate. The identity certificate contains the name and signature of the intermediate certificate that it is signed by, and in turn, the intermediate certificate contains the name and signature of the root certificate that it is signed by. The root certificate is always signed by the certificate authority itself, terminating the certificate chain.

Example of a certificate chain

When connecting to a server with security, you need to provide the device with one of the certificates in the certificate chain so the device can verify the authenticity of the server before connecting. We will take a look at how to do this in the exercise section of Lesson 4 and Lesson 5.

Sockets

The next layer in the network protocol stack is the socket API. The socket API is what the application and the application layer protocols use to interface with the protocol stack.

A network socket is a software endpoint that allows communication between different processes or applications over a network. It provides a programming interface for network communication, enabling processes running on different devices to exchange data.

In a network communication scenario, you can think of a socket as a door through which information can enter or leave a device. It acts as a communication channel that facilitates data transmission between two endpoints, typically on different devices connected to a network.

Sockets use the client-server model, where one device acts as a server and waits for incoming connections, while another device acts as a client and initiates the connection. The server socket listens for incoming requests, and the client socket establishes a connection with the server socket.

Definition

Socket: A socket is a software structure that serves as an endpoint for sending and receiving data across a network.

Make sure to Log in or Register to save your progress

Back
Next

Nordic Developer Academy Privacy Policy

 

1. Introduction 

In this Privacy Policy you will find information on Nordic Semiconductor ASA (“Nordic Semiconductor”) processes your personal data when you use the Nordic Developer Academy.

References to “we” and “us” in this document refers to Nordic Semiconductor.

 

2. Our processing of personal data when you use the Nordic Developer Academy 

2.1 Nordic Developer Academy 

Nordic Semiconductor processes personal data in order to provide you with the features and functionality of the Nordic Developer Academy. Creating a user account is optional, but required if you want to track you progress and view your completed courses and obtained certificates. If you choose to create a user account, we will process the following categories of personal data:

  • Email
  • Name
  • Password (encrypted)
  • Course progression (e.g. which course you have completely or partly completed)
  • Certificate information, which consists of name of completed course and the validity of the certificate
  • Course results

During your use of the Nordic Developer Academy, you may also be asked if you want to provide feedback. If you choose to respond to any such surveys, we will also process the personal data in your responses in that survey.

The legal basis for this processing is GDPR article 6 (1) b. The processing is necessary for Nordic Semiconductor to provide the Nordic Developer Academy under the Terms of Service.

 

2.2 Analytics 

If you consent to analytics, Nordic Semiconductor will use Google Analytics to obtain statistics about how the Nordic Developer Academy is used. This includes collecting information on for example what pages are viewed, the duration of the visit, the way in which the pages are maneuvered, what links are clicked, technical information about your equipment. The information is used to learn how Nordic Developer Academy is used and how the user experience can be further developed.

 

2.2 Newsletter 

You can consent to receive newsletters from Nordic from within the Nordic Developer Academy. How your personal data is processed when you sign up for our newsletters is described in the Nordic Semiconductor Privacy Policy.

 

3. Retention period 

We will store your personal data for as long you use the Nordic Developer Academy. If our systems register that you have not used your account for 36 months, your account will be deleted.

 

4. Additional information 

Additional information on how we process personal data can be found in the Nordic Semiconductor Privacy Policy and Cookie Policy.

‍‍ 

Nordic Developer Academy Terms of Service

 

1. Introduction

‍These terms and conditions (“Terms of Use”) apply to the use of the Nordic Developer Academy, provided by Nordic Semiconductor ASA, org. nr. 966 011 726, a public limited liability company registered in Norway (“Nordic Semiconductor”). ‍

Nordic Developer Academy allows the user to take technical courses related to Nordic Semiconductor products, software and services, and obtain a certificate certifying completion of these courses. By completing the registration process for the Nordic Developer Academy, you are agreeing to be bound by these Terms of Use.

These Terms of Use are applicable as long as you have a user account giving you access to Nordic Developer Academy.‍

‍2. Access to and use of Nordic Developer Academy

‍‍Upon acceptance of these Terms of Use you are granted a non-exclusive right of access to, and use of Nordic Developer Academy, as it is provided to you at any time. Nordic Semiconductor provides Nordic Developer Academy to you free of charge, subject to the provisions of these Terms of Use and the Nordic Developer Academy Privacy Policy.

To access select features of Nordic Developer Academy, you need to create a user account. You are solely responsible for the security associated with your user account, including always keeping your login details safe.

You will able to receive an electronic certificate from Nordic Developer Academy upon completion of courses. By issuing you such a certificate, Nordic Semiconductor certifies that you have completed the applicable course, but does not provide any further warrants or endorsements for any particular skills or professional qualifications.

Nordic Semiconductor will continuously develop Nordic Developer Academy with new features and functionality, but reserves the right to remove or alter any existing functions without notice.

‍3. Acceptable use

You undertake that you will use Nordic Developer Academy in accordance with applicable law and regulations, and in accordance with these Terms of Use.‍ You must not modify, adapt, or hack Nordic Developer Academy or modify another website so as to falsely imply that it is associated with Nordic Developer Academy, Nordic Semiconductor, or any other Nordic Semiconductor product, software or service.

You agree not to reproduce, duplicate, copy, sell, resell or in any other way exploit any portion of Nordic Developer Academy, use of Nordic Developer Academy, or access to Nordic Developer Academy without the express written permission by Nordic Semiconductor. You must not upload, post, host, or transmit unsolicited email, SMS, or \”spam\” messages.

You are responsible for ensuring that the information you post and the content you share does not;

  • contain false, misleading or otherwise erroneous information
  • infringe someone else’s copyrights or other intellectual property rights
  • contain sensitive personal data or
  • contain information that might be received as offensive or insulting.
  • Such information may be removed without prior notice.

‍Nordic Semiconductor reserves the right to at any time determine whether a use of Nordic Developer Academy is in violation of its requirements for acceptable use.

Violation of the at any time applicable requirements for acceptable use may result in termination of your account. We will take reasonable steps to notify you and state the reason for termination in such cases.

‍4. Routines for planned maintenance

‍Certain types of maintenance may imply a stop or reduction in availability of Nordic Developer Academy. Nordic Semiconductor does not warrant any level of service availability but will provide its best effort to limit the impact of any planned maintenance on the availability of Nordic Developer Academy.

5. Intellectual property rights

‍Nordic Semiconductor retains all rights to all elements of Nordic Developer Academy. This includes, but is not limited to, the concept, design, trademarks, know-how, trade secrets, copyrights and all other intellectual property rights.

Nordic Semiconductor receives all rights to all content uploaded or created in Nordic Developer Academy. You do not receive any license or usage rights to Nordic Developer Academy beyond what is explicitly stated in this Agreement.

‍6. Liability and damages

‍Nothing within these Terms of Use is intended to limit your statutory data privacy rights as a data subject, as described in the Nordic Developer Academy Privacy Policy. ‍You acknowledge that errors might occur from time to time and waive any right to claim for compensation as a result of errors in Nordic Developer Academy. When an error occurs, you shall notify Nordic Semiconductor of the error and provide a description of the error situation.

You agree to indemnify Nordic Semiconductor for any loss, including indirect loss, arising out of or in connection with your use of Nordic Developer Academy or violations of these Terms of Use. ‍Nordic Semiconductor shall not be held liable for, and does not warrant that (i) Nordic Developer Academy will meet your specific requirements, (ii) Nordic Developer Academy will be uninterrupted, timely, secure, or error-free, (iii) the results that may be obtained from the use of Nordic Developer Academy will be accurate or reliable, (iv) the quality of any products, services, information, or other material purchased or obtained by you through Nordic Developer Academy will meet your expectations, or that (v) any errors in Nordic Developer Academy will be corrected.

You accept that this is a service provided to you without any payment and hence you accept that Nordic Semiconductor will not be held responsible, or liable, for any breaches of these Terms of Use or any loss connected to your use of Nordic Developer Academy. Unless otherwise follows from mandatory law, Nordic Semiconductor will not accept any such responsibility or liability.

‍7. Change of terms

‍Nordic Semiconductor may update and change the Terms of Use from time to time. Nordic Semiconductor will seek to notify you about significant changes before such changes come into force and give you a possibility to evaluate the effects of proposed changes. Continued use of Nordic Developer Academy after any such changes shall constitute your acceptance of such changes. You can review the current version of the Terms of Use at any time at https://academy.nordicsemi.com/terms-of-service/

‍8. Transfer of rights

‍Nordic Semiconductor is entitled to transfer its rights and obligation pursuant to these Terms of Use to a third party as part of a merger or acquisition process, or as a result of other organizational changes.

‍9. Third Party Services

‍‍To the extent Nordic Developer Academy facilitates access to services provided by a third party, you agree to comply with the terms governing such third party services. Nordic Semiconductor shall not be held liable for any errors, omissions, inaccuracies, etc. related to such third party services.

‍10. Dispute resolution

‍‍The Terms of Use and any other legally binding agreement between yourself and Nordic Semiconductor shall be subject to Norwegian law and Norwegian courts’ exclusive jurisdiction.

 

Switch language?

Progress is tracked separately for each language. Switching will continue from your progress in that language or start fresh if you haven't begun.

Your current progress is saved, and you can switch back anytime.

Log in
Don’t have an account? Register an account

Forgot your password?
Register an account
Already have an account? Log in
(All fields are required unless specified optional)

  • 8 or more characters
  • Upper and lower case letters
  • At least one number or special character

Forgot your password?
Enter the email associated with your account, and we will send you a link to reset your password.

Back to Log in

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.

      Change summary

      What's new in the latest version

      Wi-Fi

      Wi-Fi

      •Support for WPA3-SAE using PSA APIs.
      •Support for Wi-Fi Direct® operation mode on the nRF7002 DK, with support for Wi-Fi Direct added to the Wi-Fi: WFA QuickTrack control application.
      •Updated Zperf to enable Raw TX throughput testing and throughput improvements.
      •(Experimental) Support for the nRF54LM20B SoC combined with the nRF7002-EB II shield.
      MCUboot & Partition Manager

      MCUboot & Partition Manager

      •Single-Slot DFU and RAM Load mode are both promoted to fully supported
      •Partition Manager is officially deprecated in favor of Zephyr's devicetree-based partitioning.