Let's look at the scanning table in a bit more detail. This table is primarily a list of access point addresses (BSSIDs), and the parameters that the access point advertises. The 802.11 standard lists at least some parameters that may be useful to hold in the client's scanning table, as in Table 1.
Field | Meaning |
---|---|
BSSID | The Ethernet address of the access point's service for this SSID |
SSID | The SSID text string |
BSS Type | Whether the access point is a real access point, or an ad hoc device |
Beacon Period | Number of microseconds between beacons |
DTIM Period | How many beacons must go by before broadcast/multicast frames are sent |
Timestamp | The time the last beacon or probe response was scanned for this client |
Local Time | The value of the access point's time counter |
Physical Parameters | What type of radio the access point is using, and how it is configured |
Channel | The channel of the access point |
Capabilities | The capabilities the access point advertises in the Capabilities field |
Basic Rate/MCS Set | The minimum rates (and MCS for 802.11 n) that this client must support to gain entry |
Operational Rate/MCS Set | The allowed rates (and MCS for 802.11n) that this client can use once it associates |
Country | The country and regional information for the radio |
Security Information | The required security algorithms |
Load | How loaded the access point reports itself to be |
WMM Parameters | The WMM parameters that the client must use once it associates |
Other Information | Depends on the standards that the client and access point supports |
This table contains the fields taken from the access point's beacons and probe responses. Most of the information is necessary for the client to possess before it can associate, because this information contains parameters that the client needs to adopt upon association. By looking at this table, clients can easily see which access points have the right SSID, but will not allow the client to associate. Examples are for access points that require a higher grade of security than the client is configured for, or require a more advanced radio (such as 802.1 In) than the client supports. Most of the time, however, a properly configured network will not advertise anything that would prevent a properly configured client from entering.
In addition to all of this mostly static, configuration information that the access point reports, clients may collect other information that they may themselves find useful when deciding to which access point they should associate. This information is unique to the client, based on environmental factors. Generally, this information (not that in Table 1) is far more important in determining how a client chooses where to hand off or associate to. Table 2 contains some more frequent examples of information that different clients may choose to collect. Again, there is no standard here; clients may collect whatever information they want. Roughly, the information they collect is divided into two types: information observed about the access point, and information observed about the channel the access point is on. This split is necessary, because clients have to choose which channel to use as a part of choosing which access point to associate to. Properties like noise floor or observed over-the-air activity belong to the channel at the point in place and time that the client is in. On the other hand, some properties belong directly to the access point without regard to channel, such as the power level at which the client sees the access point's beacon frames. Furthermore, some of the per-access-point information may have been collected from previous periods when the client had been associated to that access point, and measured the quality of the connection.
Field | Meaning |
---|---|
Signal Strength | The power level of the beacon or probe response from the access point |
Channel Noise | The measured noise floor value on the channel the access point is on |
Channel Activity | How often the channel the access point is on is busy |
Number of Observed Clients | How many clients are on the channel the access point is on |
Beacon Loss Rate | How often beacons are missed on that channel, even though they are expected |
Probe Request Loss Rate | How many times probe requests had to be sent to get a probe response |
Previous Data Loss Rate | If associated earlier, how much loss was present between the access point and client |
Probe Request Needed | Whether the client needed to send a probe request |
The scanning table is something that the client maintains over time, as a fluid, "living" menu of options. One of the challenges the client has is in determining how old, or stale, the information may be—especially the performance information—and whether it has observed that channel or access point long enough to have some confidence in what it has seen. This is a constant struggle, and different clients (even different software versions from the same client vendor) can have widely different ways of judging how much of the table to trust and whether it needs to get new information. This is one of the sources of the variability present in Wi-Fi.
No comments:
Post a Comment