Perspective On Wireless Network Packet-Level Protocol Analysis and Protocol Analyzer Software ToolsAt Connect802, our consulting and engineering services include packet-level analysis with a protocol analyzer. Packet-level protocol analysis is accomplished with a software protocol analyzer that runs, typically, on a notebook or similar computer. There is an aspect of hardware operation that must be addressed in order for a computer to capture packets from the air. Normally a wireless client device associated to a specific 802.11 access point to exchange data. When capturing wireless packets from the air an 802.11 WiFi adapter must behave differently.
"Promiscuous Mode" and Notebook Computer Operation
There is an operational mode called "promiscuous mode" that can be initiated for a WiFi adapter that tells it to ignore the destination address in acquired packets and simply pass them all up the protocol stack. Promiscuous mode requires, however, that the adapter be associated to an access point. It captures only those packets sent from that one access point. This was how wireless packet capture was initially performed in the early 2000's when the first wireless protocol analyzer software was developed.
For effective wireless network analysis, promiscuous mode does not provide a complete picture of network protocol operation. Because this mode would require the wireless card to be associated to an access point it would not capture all wireless frames in the environment. There are, in addition to 802.11 data frames (containing TCP/IP and other Ethernet-like traffic), 802.11-specific frames for WLAN management and control. By default, many wireless NIC drivers will not pass up 802.11 management and control frames and therefore would not be visible in the protocol analyzer. 802.11 wireless networks are half-duplex, and wireless NICs cannot listen (receive packets) while transmitting.
"RF Monitor Mode" for Packet Analyzer Software
Because of the problem of lost management and control traffic when using promiscuous mode, wireless analyzers place the NICs into a special mode called "RF monitor mode" In RF monitor mode, the wireless NIC card becomes a passive monitoring device without the ability to transmit. As a result, the packet capture NIC cannot be used as a normal WiFi adapter because normal wireless network operation is disabled. In RF monitor mode, wireless NICs listen to all 802.11-encoded signals on the channel on which they are currently monitoring. It's typical to find that a notebook computer running an adapter in RF monitor mode will have a second adapter that is associated to an access point for normal WiFi operation.
Finding the Best Location for Capturing Packets From the WLAN
Imagine a misconfigured client device transmitting faulty packets over the air. This device could be several hundred feet away from an access point. If an on-site wireless network engineer was capturing packets several hundred feet on the opposite side of the access point it's possible that only the packets transmitted by the AP would be received with sufficient signal strength and SNR to allow them to be properly acquired. Packets from the faulty client, on the opposite side of the AP, could end up being too weak to be captured. The same is true if a localized noise source was disrupting a client device's ability to received packets but the noise was not impacting the location where the protocol analyzer was capturing traffic.
Identifying the correct location to place a network analyzer is a key part of performing successful wireless network analysis. If the protocol analyzer is in a poor location the placement of the wireless analyzer can lead to incorrect conclusions regarding the wireless LAN environment. For example, the packet analyzer is capturing traffic too far away from the access point and the client of interest there might be lot of corrupted frames; however, the intended recipient may not be experiencing any frame corruption.
Protocol Analysis Consulting Support Services and the WireShark protocol analyzer
When you need help analyzing a trace file, the Connect802 TRAC service will provide you with a consulting resource to meet your project requirements. To capture a trace file all you need is the free and open-source WireShark software program. Wireshark is the world's foremost and widely-used network protocol analyzer. The WireShark protocol analyzer software is supported by a development-community-at-large and is not a commercial product. There are over 600 contributors who have provided packet dissector and driver code for WireShark. WireShark's primary sponsor is Riverbed Technology and they maintain the code base for the WireShark protocol analyzer software. There are two operating modes to be aware of with WireShark: local packet capture with a standard WiFi adapter and capture with RF Monitor Mode.