Wireless Intrusion Detection: This word reminds us of security, but many wireless Intrusion Detection Systems (WIDS) products can also be used for WLAN performance monitoring, provides valuable insights for troubleshooting, fine-tuning, and use planning. So how do you use WIDS to obtain more information?
WLAN Performance Analysis and tools
In many cases, WLAN performance needs to be analyzed, from initial design and debugging of newly installed devices to optimized coverage and planned expansion. Many tools are useful during this lifecycle, including site survey tools, RF design instruments, spectrum analyzers, and wireless flow analyzers.
The wireless Flow Analyzer is necessary to capture and encode the 802.11 information stream, and then re-assemble the information package into the relationship between the joint and RF devices. Analyzer helps you understand what is happening at a specific WLAN address within a limited period of time. However, you sometimes need to return the information to view more information about the WLAN and collect information for a longer period of time. WIDS can help you.
WIDS can monitor the entire WLAN and forward the main information streams captured by distributed sensors to the central server. Collect these information flows and associate them to analyze security incidents. WIDS displays the generated alarms and forwards them to another system, or records them in the database for future reference. Of course, these information flows can also be used to monitor WLAN performance.
Performance alert
Although WIDS has different performance analysis and alarm functions, there is a performance alarm sample that can be monitored by wireless Intrusion Detection:
◆ The Access Point of the site is overloaded.
◆ Access point or information stream channel overload
◆ Excessive management costs
◆ Constant information flow sent/received by the client
◆ Access Point configuration is unreasonable or incompatible
◆ Synchronous PCF/DCF centralized coordination/Distributed Coordination) Operation
◆ The power of the Access Point relieves the DTIM conflict
◆ The 802.11g access point cannot be protected near the 802.11b Access Point
◆ 802.11g Access Points provide inappropriate short-term Slots
◆ The Access Point provides a non-standard data rate
◆ Excessive retries or CRC errors
◆ Excessive roaming or reconnection
◆ Excessive Low-speed transmission
◆ Excessive Dispersion
◆ Detects hidden sites
◆ Radar interference detected
◆ Channel noise level is too high