How to monitor WLAN performance using WIDS? (1)

Source: Internet
Author: User

Wireless Intrusion Detection: This word reminds us of security, but many wireless Intrusion Detection Systems (WIDS) products can also be used for WLAN performance monitoring, provides valuable insights for troubleshooting, fine-tuning, and use planning. So how do you use WIDS to obtain more information?

WLAN Performance Analysis and tools

In many cases, WLAN performance needs to be analyzed, from initial design and debugging of newly installed devices to optimized coverage and planned expansion. Many tools are useful during this lifecycle, including site survey tools, RF design instruments, spectrum analyzers, and wireless flow analyzers.

The wireless Flow Analyzer is necessary to capture and encode the 802.11 information stream, and then re-assemble the information package into the relationship between the joint and RF devices. Analyzer helps you understand what is happening at a specific WLAN address within a limited period of time. However, you sometimes need to return the information to view more information about the WLAN and collect information for a longer period of time. WIDS can help you.

WIDS can monitor the entire WLAN and forward the main information streams captured by distributed sensors to the central server. Collect these information flows and associate them to analyze security incidents. WIDS displays the generated alarms and forwards them to another system, or records them in the database for future reference. Of course, these information flows can also be used to monitor WLAN performance.

Performance alert

Although WIDS has different performance analysis and alarm functions, there is a performance alarm sample that can be monitored by wireless Intrusion Detection:

◆ The Access Point of the site is overloaded.

◆ Access point or information stream channel overload

◆ Excessive management costs

◆ Constant information flow sent/received by the client

◆ Access Point configuration is unreasonable or incompatible

◆ Synchronous PCF/DCF centralized coordination/Distributed Coordination) Operation

◆ The power of the Access Point relieves the DTIM conflict

◆ The 802.11g access point cannot be protected near the 802.11b Access Point

◆ 802.11g Access Points provide inappropriate short-term Slots

◆ The Access Point provides a non-standard data rate

◆ Excessive retries or CRC errors

◆ Excessive roaming or reconnection

◆ Excessive Low-speed transmission

◆ Excessive Dispersion

◆ Detects hidden sites

◆ Radar interference detected

◆ Channel noise level is too high


Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.