SlideShare a Scribd company logo
1 of 16
www.wildpackets.com© WildPackets, Inc.
Why Every Engineer Needs WLAN
Packet Analysis
How to solve 10 common Wi-Fi problems by
dissecting packets
Jay Botelho
Director of Product Management
WildPackets
jbotelho@wildpackets.com
Follow me @jaybotelho
© WildPackets, Inc.
Critical Elements of a
Packet Analysis Solution
• Performance
• Multi-channel analysis
• Visualization
• Analysis modules
• High-quality decodes
© WildPackets, Inc.
10 Common Problems
• Verifying device capabilities
‒ Networks
‒ Clients
• Verifying device
configuration
‒ Poor configuration choices
• Connection issues
‒ Authentication
• Poor VoFi quality
• Identifying network
bottlenecks
‒ Chatty clients (let me count
the ways)
‒ Probe requests
‒ Inefficient network utilization
• Roaming
‒ Sticky clients
‒ Roaming latency
© WildPackets, Inc.
Verifying Device Capabilities
• Network capabilities – Beacons
• Client capabilities – Probe Requests
© WildPackets, Inc.
Verifying Device Configuration
• QoS enabled/disabled
• Beacon intervals
• CTS frames sent out with 10,000 microsecond
duration field (viewed as duration attack)
© WildPackets, Inc.
Connection Issues
Authentication – EAPOL Key Exchange
• The AP sends a nonce-value to
the STA (ANonce)
• The STA sends its own nonce-
value (SNonce) to the AP
together with a MIC, including
authentication
• The AP sends the GTK and a
sequence number together
with another MIC
• The STA sends a confirmation
to the AP
© WildPackets, Inc.
Poor VoFi Quality
• RTP packets (g.711)
• Jitter, packet loss, latency
• Relative packet timing
© WildPackets, Inc.
Identifying Network Bottlenecks
• Chatty clients (let me count the ways)
• Probe requests
‒ Probe Requests to all SSIDs, not just current one, flooding
device with responses
• Inefficient network utilization
© WildPackets, Inc.
Chatty Client - Unassociated
http://www.sniffwifi.com/2012/04/phones-on-wlan.html
© WildPackets, Inc.
Chatty Client - Associated
http://www.sniffwifi.com/2012/04/phones-on-wlan.html
© WildPackets, Inc.
Inefficient Network Utilization
http://www.sniffwifi.com/2014/05/why-are-you-slowing-down-my-wifi-apple.html
© WildPackets, Inc.
Inefficient Network Utilization (cont.)
http://www.sniffwifi.com/2014/05/why-are-you-slowing-down-my-wifi-apple.html
© WildPackets, Inc.
Roaming Issues
• Sticky clients
‒ Clients make poor roaming
decisions
‒ Look for: signal strength,
data rates, etc.
• Roaming latency
‒ Criteria for determining
latency depends on your
perspective
http://revolutionwifi.blogspot.com/2012/12/wi-fi-roaming-analysis-part-3-measuring.html
© WildPackets, Inc.
© WildPackets, Inc.
Additional Resources
• http://www.sniffwifi.com/2012/04/phones-on-wlan.html
• http://www.sniffwifi.com/2014/07/i-guess-apple-wireless-routers-dont.html
• http://www.sniffwifi.com/2014/05/why-are-you-slowing-down-my-wifi-apple.html
• http://www.sniffwifi.com/2013/12/iphones-be-chatty.html
• http://www.sniffwifi.com/2013/09/a-fish-in-desert-chomecast-sniffed.html
• http://www.sniffwifi.com/2013/08/eighteen-seconds-of-very-chatty-iphone.html
• http://www.sniffwifi.com/2012/08/testing-mobility-with-omnipeek.html
• http://www.sniffwifi.com/2011/11/how-do-i-know-if-it-really-links-me.html
• http://www.sniffwifi.com/2011/11/tell-me-whys-tell-me-sweet-little-whys.html
• http://www.sniffwifi.com/2011/11/what-is-wrong-with-this-wifi-and-what.html
• http://sc-wifi.com/2013/08/27/troubleshooting-done-motorola-style/
• http://sc-wifi.com/2012/11/12/tag-vendor-specific-nintendo/
• http://www.wifikiwi.com/cwap/a-sticky-problem-wi-fi-clients-that-wont-roam/
• http://revolutionwifi.blogspot.com/2012/12/wi-fi-roaming-analysis-part-3-measuring.html
www.wildpackets.com© WildPackets, Inc.
Thank You!
WildPackets, Inc.
1340 Treat Boulevard, Suite 500
Walnut Creek, CA 94597
(925) 937-3200

More Related Content

What's hot

Enterprise Agents: Deployment Best Practices
Enterprise Agents: Deployment Best PracticesEnterprise Agents: Deployment Best Practices
Enterprise Agents: Deployment Best PracticesThousandEyes
 
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS AttackAn Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS AttackImperva Incapsula
 
Migrating from Akamai to Incapsula: What You Need to Know
Migrating from Akamai to Incapsula: What You Need to KnowMigrating from Akamai to Incapsula: What You Need to Know
Migrating from Akamai to Incapsula: What You Need to KnowImperva Incapsula
 
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate Performance
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate PerformanceIncapsula: How to Increase SaaS Websites’ Uptime and Accelerate Performance
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate PerformanceImperva Incapsula
 
conf2015_TLaGatta_CHarris_Splunk_BusinessAnalytics_DeliveringHighLevelAnalytics
conf2015_TLaGatta_CHarris_Splunk_BusinessAnalytics_DeliveringHighLevelAnalyticsconf2015_TLaGatta_CHarris_Splunk_BusinessAnalytics_DeliveringHighLevelAnalytics
conf2015_TLaGatta_CHarris_Splunk_BusinessAnalytics_DeliveringHighLevelAnalyticsTom LaGatta
 
Protect Your Assets with Single IP DDoS Protection
Protect Your Assets with Single IP DDoS ProtectionProtect Your Assets with Single IP DDoS Protection
Protect Your Assets with Single IP DDoS ProtectionImperva Incapsula
 
DNS and Infrastracture DDoS Protection
DNS and Infrastracture DDoS ProtectionDNS and Infrastracture DDoS Protection
DNS and Infrastracture DDoS ProtectionImperva Incapsula
 
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...Imperva Incapsula
 
E-commerce Optimization: Using Load Balancing and CDN to Improve Website Perf...
E-commerce Optimization: Using Load Balancing and CDN to Improve Website Perf...E-commerce Optimization: Using Load Balancing and CDN to Improve Website Perf...
E-commerce Optimization: Using Load Balancing and CDN to Improve Website Perf...Imperva Incapsula
 
What's Wrong with Vulnerability Management & How Can We Fix It
What's Wrong with Vulnerability Management & How Can We Fix ItWhat's Wrong with Vulnerability Management & How Can We Fix It
What's Wrong with Vulnerability Management & How Can We Fix ItSkybox Security
 
NetScout Systems corporate overview
NetScout Systems corporate overviewNetScout Systems corporate overview
NetScout Systems corporate overviewBAKOTECH
 
DNS Measurement Activity on ITB 2010
DNS Measurement Activity on ITB 2010DNS Measurement Activity on ITB 2010
DNS Measurement Activity on ITB 2010Affan Basalamah
 
Network Critical
Network CriticalNetwork Critical
Network Criticalgigamon
 
5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of VulnerabilitySkybox Security
 
Endpoint Agent Part 2: Monitoring SaaS Apps from Anywhere
Endpoint Agent Part 2: Monitoring SaaS Apps from AnywhereEndpoint Agent Part 2: Monitoring SaaS Apps from Anywhere
Endpoint Agent Part 2: Monitoring SaaS Apps from AnywhereThousandEyes
 
Solera Networks
Solera NetworksSolera Networks
Solera Networksgigamon
 
Gigamon Systems
Gigamon SystemsGigamon Systems
Gigamon Systemsgigamon
 
Bhutan Cybersecurity Week 2021: APNIC vulnerability reporting program
Bhutan Cybersecurity Week 2021: APNIC vulnerability reporting programBhutan Cybersecurity Week 2021: APNIC vulnerability reporting program
Bhutan Cybersecurity Week 2021: APNIC vulnerability reporting programAPNIC
 

What's hot (20)

Enterprise Agents: Deployment Best Practices
Enterprise Agents: Deployment Best PracticesEnterprise Agents: Deployment Best Practices
Enterprise Agents: Deployment Best Practices
 
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS AttackAn Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
 
Migrating from Akamai to Incapsula: What You Need to Know
Migrating from Akamai to Incapsula: What You Need to KnowMigrating from Akamai to Incapsula: What You Need to Know
Migrating from Akamai to Incapsula: What You Need to Know
 
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate Performance
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate PerformanceIncapsula: How to Increase SaaS Websites’ Uptime and Accelerate Performance
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate Performance
 
conf2015_TLaGatta_CHarris_Splunk_BusinessAnalytics_DeliveringHighLevelAnalytics
conf2015_TLaGatta_CHarris_Splunk_BusinessAnalytics_DeliveringHighLevelAnalyticsconf2015_TLaGatta_CHarris_Splunk_BusinessAnalytics_DeliveringHighLevelAnalytics
conf2015_TLaGatta_CHarris_Splunk_BusinessAnalytics_DeliveringHighLevelAnalytics
 
Protect Your Assets with Single IP DDoS Protection
Protect Your Assets with Single IP DDoS ProtectionProtect Your Assets with Single IP DDoS Protection
Protect Your Assets with Single IP DDoS Protection
 
DNS and Infrastracture DDoS Protection
DNS and Infrastracture DDoS ProtectionDNS and Infrastracture DDoS Protection
DNS and Infrastracture DDoS Protection
 
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
 
E-commerce Optimization: Using Load Balancing and CDN to Improve Website Perf...
E-commerce Optimization: Using Load Balancing and CDN to Improve Website Perf...E-commerce Optimization: Using Load Balancing and CDN to Improve Website Perf...
E-commerce Optimization: Using Load Balancing and CDN to Improve Website Perf...
 
What's Wrong with Vulnerability Management & How Can We Fix It
What's Wrong with Vulnerability Management & How Can We Fix ItWhat's Wrong with Vulnerability Management & How Can We Fix It
What's Wrong with Vulnerability Management & How Can We Fix It
 
NetScout Systems corporate overview
NetScout Systems corporate overviewNetScout Systems corporate overview
NetScout Systems corporate overview
 
DNS Measurement Activity on ITB 2010
DNS Measurement Activity on ITB 2010DNS Measurement Activity on ITB 2010
DNS Measurement Activity on ITB 2010
 
Network Critical
Network CriticalNetwork Critical
Network Critical
 
5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability
 
SeattleFall1
SeattleFall1SeattleFall1
SeattleFall1
 
Is Wi-Fi Enterprise so perfect?
Is Wi-Fi Enterprise so perfect?Is Wi-Fi Enterprise so perfect?
Is Wi-Fi Enterprise so perfect?
 
Endpoint Agent Part 2: Monitoring SaaS Apps from Anywhere
Endpoint Agent Part 2: Monitoring SaaS Apps from AnywhereEndpoint Agent Part 2: Monitoring SaaS Apps from Anywhere
Endpoint Agent Part 2: Monitoring SaaS Apps from Anywhere
 
Solera Networks
Solera NetworksSolera Networks
Solera Networks
 
Gigamon Systems
Gigamon SystemsGigamon Systems
Gigamon Systems
 
Bhutan Cybersecurity Week 2021: APNIC vulnerability reporting program
Bhutan Cybersecurity Week 2021: APNIC vulnerability reporting programBhutan Cybersecurity Week 2021: APNIC vulnerability reporting program
Bhutan Cybersecurity Week 2021: APNIC vulnerability reporting program
 

Viewers also liked

Network Forensics Backwards and Forwards
Network Forensics Backwards and ForwardsNetwork Forensics Backwards and Forwards
Network Forensics Backwards and ForwardsSavvius, Inc
 
Capturing 802.11ac Data
Capturing 802.11ac DataCapturing 802.11ac Data
Capturing 802.11ac DataSavvius, Inc
 
Spectrum management best practices in a Gigabit wireless world
Spectrum management best practices in a Gigabit wireless worldSpectrum management best practices in a Gigabit wireless world
Spectrum management best practices in a Gigabit wireless worldCisco Canada
 
Using WireShark with AirPCAP
Using WireShark with AirPCAPUsing WireShark with AirPCAP
Using WireShark with AirPCAPDavid Sweigert
 
Wardriving & Kismet Introduction
Wardriving & Kismet IntroductionWardriving & Kismet Introduction
Wardriving & Kismet IntroductionLance Howell
 
carnet-wifi-test-results
carnet-wifi-test-resultscarnet-wifi-test-results
carnet-wifi-test-resultsMichal Jarski
 
802.11ac: Technologies and Deployment Strategies with FarPoint Group
802.11ac: Technologies and Deployment Strategies with FarPoint Group802.11ac: Technologies and Deployment Strategies with FarPoint Group
802.11ac: Technologies and Deployment Strategies with FarPoint GroupSavvius, Inc
 
802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless Analysis
802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless Analysis802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless Analysis
802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless AnalysisSavvius, Inc
 
Wireless Network Pentestration
Wireless Network PentestrationWireless Network Pentestration
Wireless Network PentestrationKHNOG
 

Viewers also liked (17)

Wireless Attacks
Wireless AttacksWireless Attacks
Wireless Attacks
 
Network Forensics Backwards and Forwards
Network Forensics Backwards and ForwardsNetwork Forensics Backwards and Forwards
Network Forensics Backwards and Forwards
 
Capturing 802.11ac Data
Capturing 802.11ac DataCapturing 802.11ac Data
Capturing 802.11ac Data
 
Spectrum management best practices in a Gigabit wireless world
Spectrum management best practices in a Gigabit wireless worldSpectrum management best practices in a Gigabit wireless world
Spectrum management best practices in a Gigabit wireless world
 
Using WireShark with AirPCAP
Using WireShark with AirPCAPUsing WireShark with AirPCAP
Using WireShark with AirPCAP
 
Wi fi-stress-test
Wi fi-stress-testWi fi-stress-test
Wi fi-stress-test
 
Wardriving & Kismet Introduction
Wardriving & Kismet IntroductionWardriving & Kismet Introduction
Wardriving & Kismet Introduction
 
carnet-wifi-test-results
carnet-wifi-test-resultscarnet-wifi-test-results
carnet-wifi-test-results
 
802.11ac: Technologies and Deployment Strategies with FarPoint Group
802.11ac: Technologies and Deployment Strategies with FarPoint Group802.11ac: Technologies and Deployment Strategies with FarPoint Group
802.11ac: Technologies and Deployment Strategies with FarPoint Group
 
802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless Analysis
802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless Analysis802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless Analysis
802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless Analysis
 
Wireless Network Pentestration
Wireless Network PentestrationWireless Network Pentestration
Wireless Network Pentestration
 
802.11ac Overview
802.11ac Overview802.11ac Overview
802.11ac Overview
 
Iuwne10 S01 L02
Iuwne10 S01 L02Iuwne10 S01 L02
Iuwne10 S01 L02
 
Wireless LAN & 802.11ac Wi-Fi Fundamentals #AirheadsConf Italy
Wireless LAN & 802.11ac Wi-Fi Fundamentals #AirheadsConf ItalyWireless LAN & 802.11ac Wi-Fi Fundamentals #AirheadsConf Italy
Wireless LAN & 802.11ac Wi-Fi Fundamentals #AirheadsConf Italy
 
Very High Density (vhd) 802.11ac Wireless Network Design and Deployment Basics
Very High Density (vhd) 802.11ac Wireless Network Design and Deployment BasicsVery High Density (vhd) 802.11ac Wireless Network Design and Deployment Basics
Very High Density (vhd) 802.11ac Wireless Network Design and Deployment Basics
 
EMEA Airheads- Troubleshooting 802.1x issues
EMEA Airheads- Troubleshooting 802.1x issuesEMEA Airheads- Troubleshooting 802.1x issues
EMEA Airheads- Troubleshooting 802.1x issues
 
EMEA Airheads- ArubaOS - Rogue AP troubleshooting
EMEA Airheads- ArubaOS - Rogue AP troubleshootingEMEA Airheads- ArubaOS - Rogue AP troubleshooting
EMEA Airheads- ArubaOS - Rogue AP troubleshooting
 

Similar to Why Every Engineer Needs WLAN Packet Analysis

Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)Savvius, Inc
 
The blind spot in virtual servers - seeing with network analysis
The blind spot in virtual servers - seeing with network analysisThe blind spot in virtual servers - seeing with network analysis
The blind spot in virtual servers - seeing with network analysisSavvius, Inc
 
Introducing network analysis and data capture for 802.11ac
Introducing network analysis and data capture for 802.11acIntroducing network analysis and data capture for 802.11ac
Introducing network analysis and data capture for 802.11acSavvius, Inc
 
Network Analysis Tips and Tricks with OmniPeek
Network Analysis Tips and Tricks with OmniPeekNetwork Analysis Tips and Tricks with OmniPeek
Network Analysis Tips and Tricks with OmniPeekSavvius, Inc
 
Don't Let History Repeat Itself – Network Monitoring and Reporting with Watch...
Don't Let History Repeat Itself – Network Monitoring and Reporting with Watch...Don't Let History Repeat Itself – Network Monitoring and Reporting with Watch...
Don't Let History Repeat Itself – Network Monitoring and Reporting with Watch...Savvius, Inc
 
Gigabit WLANs Need Gigabit WLAN Analysis
Gigabit WLANs Need Gigabit WLAN AnalysisGigabit WLANs Need Gigabit WLAN Analysis
Gigabit WLANs Need Gigabit WLAN AnalysisSavvius, Inc
 
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...Savvius, Inc
 
Are you ready for 802.11ac?
Are you ready for 802.11ac?Are you ready for 802.11ac?
Are you ready for 802.11ac?Savvius, Inc
 
Real-Time Visibility into High Speed Networks
Real-Time Visibility into High Speed NetworksReal-Time Visibility into High Speed Networks
Real-Time Visibility into High Speed NetworksSavvius, Inc
 
Pinpoint the leading causes of downtime with LinkIQ Cable and Network Tester
Pinpoint the leading causes of downtime with LinkIQ Cable and Network TesterPinpoint the leading causes of downtime with LinkIQ Cable and Network Tester
Pinpoint the leading causes of downtime with LinkIQ Cable and Network TesterTranscat
 
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...Savvius, Inc
 
Netsft2017 day in_life_of_nfv
Netsft2017 day in_life_of_nfvNetsft2017 day in_life_of_nfv
Netsft2017 day in_life_of_nfvIntel
 
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)ClubHack
 
Wireless Penetration Testing
Wireless Penetration TestingWireless Penetration Testing
Wireless Penetration TestingMohammed Adam
 
DevLink - WiFu: You think your wireless is secure?
DevLink - WiFu: You think your wireless is secure?DevLink - WiFu: You think your wireless is secure?
DevLink - WiFu: You think your wireless is secure?Rob Gillen
 
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...Savvius, Inc
 
CUE Customer Sales Presentation-2023 pdf
CUE Customer Sales Presentation-2023 pdfCUE Customer Sales Presentation-2023 pdf
CUE Customer Sales Presentation-2023 pdfabenyeung
 
Chapter 1 Networking
Chapter 1 NetworkingChapter 1 Networking
Chapter 1 Networkingmlrbrown
 

Similar to Why Every Engineer Needs WLAN Packet Analysis (20)

Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
 
The blind spot in virtual servers - seeing with network analysis
The blind spot in virtual servers - seeing with network analysisThe blind spot in virtual servers - seeing with network analysis
The blind spot in virtual servers - seeing with network analysis
 
Introducing network analysis and data capture for 802.11ac
Introducing network analysis and data capture for 802.11acIntroducing network analysis and data capture for 802.11ac
Introducing network analysis and data capture for 802.11ac
 
Network Analysis Tips and Tricks with OmniPeek
Network Analysis Tips and Tricks with OmniPeekNetwork Analysis Tips and Tricks with OmniPeek
Network Analysis Tips and Tricks with OmniPeek
 
Don't Let History Repeat Itself – Network Monitoring and Reporting with Watch...
Don't Let History Repeat Itself – Network Monitoring and Reporting with Watch...Don't Let History Repeat Itself – Network Monitoring and Reporting with Watch...
Don't Let History Repeat Itself – Network Monitoring and Reporting with Watch...
 
Gigabit WLANs Need Gigabit WLAN Analysis
Gigabit WLANs Need Gigabit WLAN AnalysisGigabit WLANs Need Gigabit WLAN Analysis
Gigabit WLANs Need Gigabit WLAN Analysis
 
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
 
Are you ready for 802.11ac?
Are you ready for 802.11ac?Are you ready for 802.11ac?
Are you ready for 802.11ac?
 
Real-Time Visibility into High Speed Networks
Real-Time Visibility into High Speed NetworksReal-Time Visibility into High Speed Networks
Real-Time Visibility into High Speed Networks
 
Pinpoint the leading causes of downtime with LinkIQ Cable and Network Tester
Pinpoint the leading causes of downtime with LinkIQ Cable and Network TesterPinpoint the leading causes of downtime with LinkIQ Cable and Network Tester
Pinpoint the leading causes of downtime with LinkIQ Cable and Network Tester
 
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
 
Netsft2017 day in_life_of_nfv
Netsft2017 day in_life_of_nfvNetsft2017 day in_life_of_nfv
Netsft2017 day in_life_of_nfv
 
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)
 
Wireless Penetration Testing
Wireless Penetration TestingWireless Penetration Testing
Wireless Penetration Testing
 
redes-2
redes-2redes-2
redes-2
 
DevLink - WiFu: You think your wireless is secure?
DevLink - WiFu: You think your wireless is secure?DevLink - WiFu: You think your wireless is secure?
DevLink - WiFu: You think your wireless is secure?
 
Video-over-IP for AV
Video-over-IP for AVVideo-over-IP for AV
Video-over-IP for AV
 
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
 
CUE Customer Sales Presentation-2023 pdf
CUE Customer Sales Presentation-2023 pdfCUE Customer Sales Presentation-2023 pdf
CUE Customer Sales Presentation-2023 pdf
 
Chapter 1 Networking
Chapter 1 NetworkingChapter 1 Networking
Chapter 1 Networking
 

More from Savvius, Inc

You Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the AnswersYou Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the AnswersSavvius, Inc
 
Are You Missing Something?
Are You Missing Something?Are You Missing Something?
Are You Missing Something?Savvius, Inc
 
Managing a Widely Distributed Network
Managing a Widely Distributed NetworkManaging a Widely Distributed Network
Managing a Widely Distributed Network Savvius, Inc
 
WildPackets EMA Whitepaper Preview
WildPackets EMA Whitepaper PreviewWildPackets EMA Whitepaper Preview
WildPackets EMA Whitepaper PreviewSavvius, Inc
 
Security Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network AttacksSecurity Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network AttacksSavvius, Inc
 
The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring Savvius, Inc
 
Wired and Wireless Network Forensics
Wired and Wireless Network ForensicsWired and Wireless Network Forensics
Wired and Wireless Network ForensicsSavvius, Inc
 
Omnipliance family - Powerful Precise Affordable
Omnipliance family - Powerful Precise AffordableOmnipliance family - Powerful Precise Affordable
Omnipliance family - Powerful Precise AffordableSavvius, Inc
 
Bringing Big Data Analytics to Network Monitoring
Bringing Big Data Analytics to Network MonitoringBringing Big Data Analytics to Network Monitoring
Bringing Big Data Analytics to Network MonitoringSavvius, Inc
 
802.11-2012 Update
802.11-2012 Update802.11-2012 Update
802.11-2012 UpdateSavvius, Inc
 
Real Packets from Virtual Servers
Real Packets from Virtual ServersReal Packets from Virtual Servers
Real Packets from Virtual ServersSavvius, Inc
 

More from Savvius, Inc (11)

You Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the AnswersYou Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
 
Are You Missing Something?
Are You Missing Something?Are You Missing Something?
Are You Missing Something?
 
Managing a Widely Distributed Network
Managing a Widely Distributed NetworkManaging a Widely Distributed Network
Managing a Widely Distributed Network
 
WildPackets EMA Whitepaper Preview
WildPackets EMA Whitepaper PreviewWildPackets EMA Whitepaper Preview
WildPackets EMA Whitepaper Preview
 
Security Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network AttacksSecurity Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network Attacks
 
The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring
 
Wired and Wireless Network Forensics
Wired and Wireless Network ForensicsWired and Wireless Network Forensics
Wired and Wireless Network Forensics
 
Omnipliance family - Powerful Precise Affordable
Omnipliance family - Powerful Precise AffordableOmnipliance family - Powerful Precise Affordable
Omnipliance family - Powerful Precise Affordable
 
Bringing Big Data Analytics to Network Monitoring
Bringing Big Data Analytics to Network MonitoringBringing Big Data Analytics to Network Monitoring
Bringing Big Data Analytics to Network Monitoring
 
802.11-2012 Update
802.11-2012 Update802.11-2012 Update
802.11-2012 Update
 
Real Packets from Virtual Servers
Real Packets from Virtual ServersReal Packets from Virtual Servers
Real Packets from Virtual Servers
 

Recently uploaded

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 

Recently uploaded (20)

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 

Why Every Engineer Needs WLAN Packet Analysis

  • 1. www.wildpackets.com© WildPackets, Inc. Why Every Engineer Needs WLAN Packet Analysis How to solve 10 common Wi-Fi problems by dissecting packets Jay Botelho Director of Product Management WildPackets jbotelho@wildpackets.com Follow me @jaybotelho
  • 2. © WildPackets, Inc. Critical Elements of a Packet Analysis Solution • Performance • Multi-channel analysis • Visualization • Analysis modules • High-quality decodes
  • 3. © WildPackets, Inc. 10 Common Problems • Verifying device capabilities ‒ Networks ‒ Clients • Verifying device configuration ‒ Poor configuration choices • Connection issues ‒ Authentication • Poor VoFi quality • Identifying network bottlenecks ‒ Chatty clients (let me count the ways) ‒ Probe requests ‒ Inefficient network utilization • Roaming ‒ Sticky clients ‒ Roaming latency
  • 4. © WildPackets, Inc. Verifying Device Capabilities • Network capabilities – Beacons • Client capabilities – Probe Requests
  • 5. © WildPackets, Inc. Verifying Device Configuration • QoS enabled/disabled • Beacon intervals • CTS frames sent out with 10,000 microsecond duration field (viewed as duration attack)
  • 6. © WildPackets, Inc. Connection Issues Authentication – EAPOL Key Exchange • The AP sends a nonce-value to the STA (ANonce) • The STA sends its own nonce- value (SNonce) to the AP together with a MIC, including authentication • The AP sends the GTK and a sequence number together with another MIC • The STA sends a confirmation to the AP
  • 7. © WildPackets, Inc. Poor VoFi Quality • RTP packets (g.711) • Jitter, packet loss, latency • Relative packet timing
  • 8. © WildPackets, Inc. Identifying Network Bottlenecks • Chatty clients (let me count the ways) • Probe requests ‒ Probe Requests to all SSIDs, not just current one, flooding device with responses • Inefficient network utilization
  • 9. © WildPackets, Inc. Chatty Client - Unassociated http://www.sniffwifi.com/2012/04/phones-on-wlan.html
  • 10. © WildPackets, Inc. Chatty Client - Associated http://www.sniffwifi.com/2012/04/phones-on-wlan.html
  • 11. © WildPackets, Inc. Inefficient Network Utilization http://www.sniffwifi.com/2014/05/why-are-you-slowing-down-my-wifi-apple.html
  • 12. © WildPackets, Inc. Inefficient Network Utilization (cont.) http://www.sniffwifi.com/2014/05/why-are-you-slowing-down-my-wifi-apple.html
  • 13. © WildPackets, Inc. Roaming Issues • Sticky clients ‒ Clients make poor roaming decisions ‒ Look for: signal strength, data rates, etc. • Roaming latency ‒ Criteria for determining latency depends on your perspective http://revolutionwifi.blogspot.com/2012/12/wi-fi-roaming-analysis-part-3-measuring.html
  • 15. © WildPackets, Inc. Additional Resources • http://www.sniffwifi.com/2012/04/phones-on-wlan.html • http://www.sniffwifi.com/2014/07/i-guess-apple-wireless-routers-dont.html • http://www.sniffwifi.com/2014/05/why-are-you-slowing-down-my-wifi-apple.html • http://www.sniffwifi.com/2013/12/iphones-be-chatty.html • http://www.sniffwifi.com/2013/09/a-fish-in-desert-chomecast-sniffed.html • http://www.sniffwifi.com/2013/08/eighteen-seconds-of-very-chatty-iphone.html • http://www.sniffwifi.com/2012/08/testing-mobility-with-omnipeek.html • http://www.sniffwifi.com/2011/11/how-do-i-know-if-it-really-links-me.html • http://www.sniffwifi.com/2011/11/tell-me-whys-tell-me-sweet-little-whys.html • http://www.sniffwifi.com/2011/11/what-is-wrong-with-this-wifi-and-what.html • http://sc-wifi.com/2013/08/27/troubleshooting-done-motorola-style/ • http://sc-wifi.com/2012/11/12/tag-vendor-specific-nintendo/ • http://www.wifikiwi.com/cwap/a-sticky-problem-wi-fi-clients-that-wont-roam/ • http://revolutionwifi.blogspot.com/2012/12/wi-fi-roaming-analysis-part-3-measuring.html
  • 16. www.wildpackets.com© WildPackets, Inc. Thank You! WildPackets, Inc. 1340 Treat Boulevard, Suite 500 Walnut Creek, CA 94597 (925) 937-3200