For large networks, faults may be difficult to handle, so an effective performance and function testing tool is very convenient. In order to adapt to the current wireless network, the new generation of Wi-Fi wireless protocol analyzer brings new vigor to the network test.
The transmission media of WLAN is electromagnetic waves, which are almost ubiquitous and have no obvious boundaries. However, almost all Wi-Fi hardware has certain security vulnerabilities. Some simplified client configurations may not have any security assurance. Therefore, Signal Analysis in wireless transmission is very important.
Simplified installation, operation, and protection
Some free software allows the PC to easily log on to any open wireless network. NetStumbler is the most famous among them. It can scan all unencrypted Wi-Fi network frequencies and determine the signal-to-noise ratio and throughput of each type of network. It can even connect to the GPS receiver, map the software, and then search for sites related to Wi-Fi access points to achieve free Internet access. Enterprise IT departments are hard to find such network security vulnerabilities.
Some wireless network card manufacturers have also added the wireless scanning function in related driver software. For example, the Proxim dual-mode card can simultaneously scan all suitable channels in the 802.11a and 802.11b frequencies, and intuitively display the signal strength and bandwidth.
The perfect Wi-Fi wireless protocol analyzer is much more powerful than NetStumbler or NIC driver software, and its implementation methods are quite different. Some protocol analyzers can decode advanced protocols, including the complete TCP/IP stack and other protocols; some focus on the underlying layer, such as detecting interference sources in the wireless spectrum; some protocol analyzers can generate security alerts and have Ing tools. Others can generate underlying technical reports or output hexadecimal code in a spreadsheet.
Software Wi-Fi wireless protocol analyzer
Most protocol analyzers are software-based. These solutions include the scheduler provided by AirMagnet, the scheduler provided by WildPackets, the Free Software Ethereal, The LANFielder of WirelessValley communications, LinkFerret of Baseband technology, the Observer of NetworkInstruments, SnifferWireless of NetworkChemistry, Packetyzer, and the ISS' Wireless Scannner.
This type of protocol analyzer is designed based on a notebook or PDA. Protocol Analysis Software for AirMagnet, NetworkAssociates, and WirelessValley is designed for Windows (PocketPC) handheld devices. Therefore, it is less functional than a notebook, but can share data with the latter. At the same time, PocketPC is only suitable for the 802.11b protocol, because the processor function is weak and cannot be competent for high-speed 802.11a processing.
There is still a problem when you build the 802.11 protocol analyzer into a common PC. Because Windows does not support the 802.11 protocol, you need to use the driver software to convert 802.11 frames into a standard Ethernet frame signal, which can be recognized by the PC. A protocol analyzer cannot support network adapters (or chipset) of all vendors, and powerful protocol analysis software can support network adapters based on the same chipset, for example, many software support the Intersil Prism II chip.
In addition, most protocol analyzers require the support of smart cards, which are not compatible with Wi-Fi protocols in many high-end laptops. The AiroPeek solution provided by WildPackets is better in this regard. The smart card supports the IntelMiniPCI interface and the 802.11a protocol. Because the driver needs to be re-built for the smart card, the software analyzer often lags behind the Wi-Fi device in terms of development.
Hardware tools
Currently, the hardware analyzer includes HandheldPak provided by AirMagnet, Locust and YellowJacket provided by BVS, OptiViewWireless and WaveRunner of Fluke. Among them, Fluke's OptiView is a comprehensive hardware analysis tool, and the running platform is Microsoft's TabletPC.
The Wi-Fi wireless protocol analyzer can decode the 802.11 protocol on the MAC layer, identify IP addresses, and filter information packets through addresses.
The Wi-Fi protocol analyzer that supports advanced protocols evolved from the wired Ethernet protocol analyzer. For example, the Observer, LinkFerret, Ethereal, and OptiView solutions all support Ethernet standards, airoPeek and SnifferWireless provide separation support software. Some developers have added complete TCP/IP stack, IPX and other dedicated protocol support for analyzer.
Many protocol analyzer can differentiate access point locations and share data through software ing. Among them, the SitePlanner tool provided by LANFielder can display the three-dimensional graph of the network; the ing software BirdsEye provided by BVS can output geographic data in the form of workbooks; the AiroPeek and OptiView schemes can automatically draw network charts and display logical or physical connections through IP addresses or MAC addresses. The AirMagnet and NetStumbler schemes support Microsoft's MapPoint.
BVS hardware tools do not support advanced protocols, but focus on wireless spectrum analysis. The YellowJacket and Locust (spectrum analyzer) provided by BVS can detect non-Wi-Fi interference sources, if the system detects interference from a microwave oven, Bluetooth device, or other similar network frequencies on the 802.11b network. These tools can also detect cordless teleconference or close-range wireless systems that interfere with 802.11a networks.
The AiroPeek and AirMagnet solutions provide alarm functions to promptly notify network administrators of potential intrusions. Some analyzer is developing towards pure security tools. For example, the WaveRunner tool provided by Fluke focuses on signal strength, encryption, and other information analysis related to detection of security vulnerabilities or optimization of network coverage. The WirelessScanner software solution of ISS can generate detailed reports in simple English. It is recommended to take appropriate measures, such as disabling DHCP or blocking the MAC address of suspicious clients.