← Wireless Networking – CompTIA Network+ Certification

CompTIA Network+ Certification Study Guide

Key concepts, definitions, and exam tips organized by topic.

25 cards covered

Wireless Networking – CompTIA Network+ Certification Study Guide


Overview

Wireless networking is a critical domain on the CompTIA Network+ exam, covering the evolution of 802.11 standards, security protocols, frequency planning, and network architecture. This guide addresses the key concepts, terminology, and troubleshooting skills needed to confidently answer wireless-related questions. Understanding how standards, security, channels, and components interrelate is essential for both the exam and real-world network administration.


---


802.11 Standards


Summary

The IEEE 802.11 family of standards defines how wireless local area networks (WLANs) operate. Each successive standard has improved upon the last in terms of speed, frequency band support, and efficiency. The Network+ exam expects you to know the key characteristics of each standard and how they compare.


Standards at a Glance


| Standard | Wi-Fi Gen | Frequency | Max Speed | Key Technology |

|---|---|---|---|---|

| 802.11a | — | 5 GHz | 54 Mbps | OFDM |

| 802.11b | Wi-Fi 1 | 2.4 GHz | 11 Mbps | DSSS |

| 802.11g | Wi-Fi 3 | 2.4 GHz | 54 Mbps | OFDM, backward compatible w/ b |

| 802.11n | Wi-Fi 4 | 2.4 & 5 GHz | 600 Mbps | MIMO |

| 802.11ac | Wi-Fi 5 | 5 GHz only | ~3.5 Gbps | MU-MIMO, channel bonding |

| 802.11ax | Wi-Fi 6/6E | 2.4, 5, & 6 GHz | 9.6 Gbps | OFDMA, MU-MIMO |


Key Concepts


  • 802.11a: Operates exclusively on the 5 GHz band. 54 Mbps maximum. Not compatible with 802.11b/g due to different frequency. Less range than 2.4 GHz standards due to higher frequency signal attenuation.
  • 802.11g: Operates on 2.4 GHz, max 54 Mbps. Backward compatible with slower 802.11b devices (11 Mbps). When b devices are present, overall network speed degrades.
  • 802.11n (Wi-Fi 4): First standard to introduce MIMO (Multiple Input Multiple Output), using multiple antennas simultaneously. Supports both 2.4 GHz and 5 GHz. Max theoretical speed of 600 Mbps.
  • 802.11ac (Wi-Fi 5): 5 GHz band only. Introduced MU-MIMO (Multi-User MIMO) allowing simultaneous transmission to multiple clients. Supports wide channel bonding (80 MHz, 160 MHz). Max ~3.5 Gbps.
  • 802.11ax (Wi-Fi 6/6E): Introduced OFDMA (Orthogonal Frequency Division Multiple Access) to serve multiple clients in a single transmission — ideal for high-density environments (stadiums, offices). Wi-Fi 6E extends into the 6 GHz band, offering less congestion and wider channels. Max ~9.6 Gbps.

  • Key Terms

  • MIMO – Multiple Input Multiple Output; uses multiple antennas to increase throughput
  • MU-MIMO – Multi-User MIMO; simultaneous transmission to multiple clients
  • OFDMA – Orthogonal Frequency Division Multiple Access; divides channels into sub-carriers to serve multiple clients at once
  • Channel Bonding – Combining adjacent channels for wider bandwidth (e.g., 40 MHz, 80 MHz)
  • OFDM – Orthogonal Frequency Division Multiplexing; modulation technique used in most modern Wi-Fi standards

  • Watch Out For

    > ⚠️ 802.11a vs 802.11g confusion: Both have a 54 Mbps max speed, but 802.11a uses 5 GHz and 802.11g uses 2.4 GHz. They are NOT compatible with each other.

    >

    > ⚠️ 802.11ac is 5 GHz only: Do not confuse with 802.11n, which supports both 2.4 GHz and 5 GHz.

    >

    > ⚠️ Wi-Fi 6 vs Wi-Fi 6E: Wi-Fi 6 (802.11ax) supports 2.4 and 5 GHz; Wi-Fi 6E adds the 6 GHz band. They share the same base standard number.

    >

    > ⚠️ OFDMA ≠ OFDM: OFDMA (introduced in Wi-Fi 6) allows multiple clients to share a channel simultaneously. OFDM is an older single-user modulation technique.


    ---


    Wireless Security


    Summary

    Wireless security has evolved significantly from the broken WEP standard through to the robust WPA3 protocol. The Network+ exam tests your ability to identify the strengths and weaknesses of each security protocol and recognize common wireless attack types.


    Security Protocol Comparison


    | Protocol | Encryption | Key Management | Vulnerability |

    |---|---|---|---|

    | WEP | RC4 (weak IV) | Static key | Easily cracked; IV reuse |

    | WPA | TKIP + RC4 | PSK or 802.1X | TKIP has known weaknesses |

    | WPA2 | AES-CCMP | PSK or 802.1X | Vulnerable to offline dictionary attacks (PSK) |

    | WPA3 | AES-GCMP | SAE or 802.1X | Most secure current standard |


    Key Concepts


    #### WEP (Wired Equivalent Privacy)

  • • Uses RC4 stream cipher with a 24-bit Initialization Vector (IV)
  • • The IV is transmitted in plaintext and is too short — it repeats frequently
  • • Attackers can capture enough packets to statistically crack the encryption key
  • Considered completely broken — never use WEP in modern deployments

  • #### WPA (Wi-Fi Protected Access)

  • • Introduced as an interim fix for WEP using TKIP (Temporal Key Integrity Protocol)
  • • TKIP dynamically changes keys per packet but is still based on RC4
  • • Has known vulnerabilities and should be avoided

  • #### WPA2

  • • Uses AES-CCMP encryption — cryptographically robust and still widely deployed
  • WPA2-Personal: Uses a Pre-Shared Key (PSK) — same password for all users
  • WPA2-Enterprise: Uses 802.1X with a RADIUS server — individual user credentials; more secure and scalable for organizations
  • • Vulnerability: WPA2-Personal is susceptible to offline dictionary/brute-force attacks against the captured 4-way handshake

  • #### WPA3

  • WPA3-Personal: Replaces PSK with SAE (Simultaneous Authentication of Equals) — a Diffie-Hellman-based handshake that provides forward secrecy and resists offline dictionary attacks
  • WPA3-Enterprise: Uses 192-bit cryptographic strength
  • Forward secrecy: Even if the password is later compromised, previously captured sessions cannot be decrypted

  • #### Common Wireless Attacks


  • Evil Twin Attack: Rogue AP broadcasting the same SSID as a legitimate network. Users unknowingly connect to the attacker's AP, enabling man-in-the-middle (MitM) interception.
  • Deauthentication Attack: Attacker sends forged deauth frames to disconnect clients from a legitimate AP, often to force reconnection and capture handshakes for cracking.
  • War Driving: Driving around scanning for wireless networks, often to find unsecured APs.
  • Captive Portal: Not an attack — a web redirect page requiring authentication or ToS agreement before granting access; commonly used in hotel, airport, and guest Wi-Fi deployments.

  • Key Terms

  • WEP – Wired Equivalent Privacy; deprecated and insecure
  • TKIP – Temporal Key Integrity Protocol; used in WPA; RC4-based
  • AES-CCMP – Advanced Encryption Standard with Counter Mode CBC-MAC Protocol; used in WPA2
  • SAE – Simultaneous Authentication of Equals; WPA3's replacement for PSK handshake
  • PSK – Pre-Shared Key; single password shared by all users on a network
  • 802.1X – Port-based network access control; used in WPA2/WPA3 Enterprise
  • RADIUS – Remote Authentication Dial-In User Service; backend authentication server for Enterprise Wi-Fi
  • Forward Secrecy – Session keys cannot be decrypted even if the long-term key is later compromised
  • Evil Twin – Rogue AP mimicking a legitimate network SSID

  • Watch Out For

    > ⚠️ WPA2-Personal vs WPA2-Enterprise: Personal uses ONE shared key; Enterprise uses individual credentials per user via RADIUS. Enterprise is more secure and auditable.

    >

    > ⚠️ WPA3 SAE vs PSK: SAE provides forward secrecy — PSK does NOT. This is a key differentiator for WPA3-Personal.

    >

    > ⚠️ Hiding the SSID ≠ Security: A hidden SSID can still be discovered through probe requests. Never rely on SSID hiding as a security measure.

    >

    > ⚠️ Captive portals are not encryption: A captive portal controls access but does NOT encrypt traffic. It is common in guest networks but offers no confidentiality protection.


    ---


    Wireless Channels & Frequency


    Summary

    Understanding how frequency bands and channel allocation work is fundamental to designing and troubleshooting wireless networks. Poor channel planning is one of the most common causes of wireless performance issues in real-world networks and is heavily tested on the Network+ exam.


    Frequency Bands Overview


    | Band | Channels | Range | Interference | Best For |

    |---|---|---|---|---|

    | 2.4 GHz | 1–14 (3 non-overlapping: 1, 6, 11) | Longer | More (microwaves, Bluetooth) | Range, IoT |

    | 5 GHz | Up to 24 non-overlapping | Shorter | Less | Speed, density |

    | 6 GHz | Many wide non-overlapping | Shortest | Least (new band) | High density, Wi-Fi 6E |


    Key Concepts


    #### 2.4 GHz Band

  • Only 3 non-overlapping channels in North America: 1, 6, and 11
  • • All other channels overlap with these three, causing adjacent channel interference
  • • Subject to interference from microwave ovens, Bluetooth devices, cordless phones, baby monitors, and other devices using the ISM (Industrial, Scientific, and Medical) frequency range
  • Channel bonding (40 MHz) on 2.4 GHz is strongly discouraged — with only 3 non-overlapping channels, bonding immediately creates co-channel interference

  • #### 5 GHz Band

  • Up to 24 non-overlapping channels across UNII-1, UNII-2, UNII-2e, and UNII-3 bands in North America
  • • Much less susceptible to common household interference
  • DFS (Dynamic Frequency Selection): Required on some 5 GHz channels (UNII-2/2e) to detect and avoid radar systems. When radar is detected, the AP automatically switches channels.
  • • Shorter range than 2.4 GHz due to higher frequency attenuation through walls and obstacles
  • • Supports wider channel bonding (80 MHz, 160 MHz) more safely than 2.4 GHz

  • #### 6 GHz Band (Wi-Fi 6E)

  • • Introduced by 802.11ax (Wi-Fi 6E)
  • • Offers the most non-overlapping channels with the least congestion
  • • Only accessible to Wi-Fi 6E (and newer) devices — legacy devices cannot use this band

  • #### Types of Interference

  • Co-channel Interference (CCI): Multiple APs on the same channel cause contention — clients must wait, reducing throughput. This is managed through proper channel planning.
  • Adjacent Channel Interference (ACI): APs on overlapping but different channels (e.g., channels 1 and 3 on 2.4 GHz) cause signal corruption, which is worse than co-channel interference because it cannot be managed by CSMA/CA.

  • Key Terms

  • ISM Band – Industrial, Scientific, and Medical; unlicensed frequency range including 2.4 GHz
  • UNII – Unlicensed National Information Infrastructure; frequency ranges in the 5 GHz band
  • DFS – Dynamic Frequency Selection; automatic radar detection and channel switching in 5 GHz
  • Channel Bonding – Combining adjacent channels to increase bandwidth
  • Co-channel Interference – Interference from APs using the same channel
  • Adjacent Channel Interference – Interference from APs using overlapping channels
  • Non-overlapping Channels – Channels that do not share any frequency spectrum

  • Watch Out For

    > ⚠️ 2.4 GHz has only 3 non-overlapping channels: Channels 1, 6, and 11. Channels 2–5 and 7–10 overlap — do not use them as primary AP channels.

    >

    > ⚠️ Adjacent channel interference is worse than co-channel: Co-channel devices at least coordinate via CSMA/CA. Adjacent channel interference causes corrupted frames with no coordination mechanism.

    >

    > ⚠️ DFS causes temporary outages: When radar is detected on a DFS channel, the AP must vacate the channel, causing a brief network interruption. Some deployments avoid DFS channels for this reason.

    >

    > ⚠️ More channels ≠ always 5 GHz advantage: While 5 GHz has more channels, its shorter range may require more APs to cover the same area as 2.4 GHz.


    ---


    Wireless Architecture & Components


    Summary

    Enterprise wireless networks are more complex than simple home Wi-Fi setups. The Network+ exam tests knowledge of how wireless components are organized, how APs are managed, and the terminology used to describe wireless network topologies.


    Key Concepts


    #### Wireless Network Modes


  • Infrastructure Mode (BSS): The standard mode. All clients communicate through a central Access Point (AP). The AP acts as the hub of the wireless cell.
  • Ad Hoc Mode (IBSS — Independent Basic Service Set): Clients communicate directly with each other without an AP. Used for peer-to-peer connections. Limited range and management capabilities.
  • Mesh Mode: APs communicate with each other wirelessly to extend coverage without requiring wired backhaul for every AP.

  • #### Service Set Terminology


  • BSS (Basic Service Set): A single AP and all its associated clients. Identified by the BSSID (usually the AP's MAC address).
  • ESS (Extended Service Set): Multiple APs configured with the same SSID, allowing clients to roam seamlessly between APs. The backbone (typically wired) connects the APs together.
  • IBSS (Independent BSS): Ad hoc network — no AP present.
  • SSID (Service Set Identifier): The human-readable name of the wireless network.

  • #### Access Points & Controllers


  • Autonomous AP: A standalone AP that handles all wireless functions (configuration, authentication, RF management) independently. Common in small deployments.
  • Lightweight AP (LWAP): An AP that offloads management functions to a central Wireless LAN Controller (WLC). The AP itself handles only real-time tasks like packet transmission.
  • Wireless LAN Controller (WLC): Centrally manages multiple lightweight APs. Responsibilities include:
  • - Pushing configuration and firmware updates

    - Managing roaming between APs

    - RF management (channel and power adjustment)

    - Enforcing security policies

    - Providing a single point of management


    #### SSID and Hidden Networks


  • • An SSID can be broadcast (visible in beacon frames) or hidden (not included in beacon frames)
  • Hidden SSID provides minimal security: Clients must actively probe for hidden networks, which can be captured by attackers using wireless packet analyzers
  • • The SSID is not a security feature — always use proper encryption (WPA2/WPA3) regardless of SSID visibility

  • Key Terms

  • SSID – Service Set Identifier; the name of a wireless network
  • • **B
  • Want more study tools?

    Subscribe for $7.99/mo and turn your own notes into personalized flashcards and study guides.

    View Pricing