Wifi module includes two types of topological forms: Infra and Adhoc. To explain the topological form of wireless network, two basic concepts should be understood first:
1: AP, or wireless access point, is the creator of a wireless network and the central node of the network. The average home or office wireless router is an AP.
2: STA site. Every terminal connected to the wireless network (such as laptop, PDA and other user devices that can connect to the Internet) can be called a site.
Infra: also known as the basic network, Infra is a wireless network created by AP and composed of numerous stas. The characteristic of this type of network is that AP is the center of the whole network and all communication in the network is forwarded through AP.
Adhoc: Adhoc, also known as Adhoc, is composed of only two or more stas without an AP in the network. This type of network is a loose structure where all stas in the network can communicate directly.
3. Security mechanism: this module supports a variety of wireless network encryption methods, which can fully guarantee the safe transmission of user data, including WEP64/WEP128/ TKIP/CCMP(AES) WEP/ wpa-psk/wpa2-psk.
4. Fast networking: this module supports fast networking by specifying channel number. In normal wireless networking, an automatic scan of all current channels is first performed to search the AP created (or Adhoc) network for the intended purpose of the connection. This module provides the parameters for setting the working channel. Under the condition that the channel of the target network is known, the working channel of the module can be directly specified, so as to accelerate the networking speed.
5. Address binding: this module supports the function of binding the BSSID address of the destination network in the networking process. According to the 802.11 protocol, different wireless networks can have the same network name (that is, SSID/ESSID), but must have a unique BSSID address. By establishing a wireless network with the same SSID/ESSID, the intruder can make the STA in the network connect to the illegal AP, thus causing the network leak. Through BSSID address binding, STA can be prevented from access to illegal network, thus improving the security of wireless network.