This invention relates generally to the field of communication and more particularly to the field of network monitoring.
As it is known in the art, a Wireless Local Area Network (WLAN) is a local-area network that uses high-frequency radio waves, rather than wires, to communicate between nodes. Typically, one of the devices in the wireless network serves as an Access Point (AP), serving as a communication hub for users of a wireless device (or station) to connect to a wired LAN. Software, executing at a station, selects the best Access Point available for connection to the LAN, taking into consideration various characteristics (such as signal power level and loading) of each AP connection.
Sometimes it may occur that an unauthorized or ‘rogue’ AP may be inserted into an existing wireless network. The rogue AP draws traffic away from the valid AP, thus potentially affecting the quality of service provided to the wireless stations. The rogue AP may have been inserted by a malicious user to adversely affect the operation of the WLAN, or alternatively been added to the network by a well meaning, yet unauthorized individual. In either instance, it is important that the WLAN manager have the ability to monitor the WLAN for the existence of the rogue APs.
One device which is typically used to detect rogue devices is a WLAN Probe. The Probe is also used to monitor various parameters of the WLAN in order to understand the performance of the WLAN, diagnose problems or detect other sources of interference. Probe devices typically include software that enables it to monitor, or “scan” all channels to collect the desired network statistics. Probe devices thus differ from AP devices, which must always stay on the same channel as the stations which are associated to it, so that the AP does not “miss” any packets that may be sent by stations on their channels.
Currently, WLAN managers add WLAN probes to their network in any location where a Probe may be needed (usually at the physical perimeter). In other embodiments, a single probe is physically periodically moved around the network in order to make measurements in all the places where they wish to take such measurements. These probe placement options therefore either add expense (if many Probes are deployed) or manual intervention (if a single Probe must be physically moved around) to the WLAN, neither of which is desirable.
According to one aspect of the invention, a system and method is provided for converting an Access Point (AP) in a wireless network into a Probe device for performing probe operations. WLAN managers may thus temporarily direct certain APs in the WLAN to instead behave as Probes. Communication between the AP and the stations is re-directed to one or more other APs in the WLAN either before or after the AP transitions into a Probe device. When a system manager determines that enough Probe data has been collected, the Probe device may be transitioned back into an AP. With such an arrangement, a system manager can control the placement and operation of Probes in the WLAN, without the added expense or manual intervention required in providing dedicated Probe devices.
According to one aspect of the invention, a method for monitoring a wireless network comprised of a plurality of access points coupled to a plurality of stations, the method comprising the steps of converting a selected access point into a probe device, performing probe operations by the probe device, and forwarding information retrieved from the probe operations to a management device.
According to another aspect of the invention, a device includes means for operating as an access device to permit a plurality of wirelessly coupled devices to communicate with a wired network, the access device and the plurality of wirelessly coupled devices forming a wireless network, means for operating as a probe device for scanning the plurality of wirelessly coupled devices to obtain operating statistics for the wireless network; and means for selectively operating as either the access device or the probe device in response to receipt of a command at the device.
In accordance with the present invention, a system and method for converting an Access Point (AP) device into a Probe device in a Wireless Local Area Network (WLAN) will now be described with reference to the attached figures. Referring to
Various types of wireless communications environments 10 exist. Wireless communications environments include for example wireless data networks and wireless I/O channels. An example of a wireless data network is described in “IEEE Standard for Information technology—Telecommunications and information exchange between systems—Local and metropolitan area networks—Specific requirements—Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications—Amendment 1: High-speed Physical Layer in the 5 GHz band”, incorporated herein by reference (hereinafter “802.11”). Furthermore, various different 802.11 “modes” are defined. For example, in IEEE 802.11 compatible wireless networks, wireless devices may be arranged in an “infrastructure mode”, whereby the network is configured such that STAs 16a-16e communicate with other network devices via APs 12a and 12b, as shown in
One network in which the present invention may be employed is the Wireless Local Area Network described in pending U.S. Application Ser. No. 10,781,228, attorney docket number 160-011 entitled “Transmission Channel Selection Apparatus”, filed Feb. 18, 2004, by Backes et al, (hereinafter the Backes application) and incorporated herein by reference.
The present invention provides a system and method for converting one of the access points (12a or 12b) into a Probe type device for the purpose of performing Probe operations. Referring now to
According to another aspect of the invention, conversion between AP and Probe functionality at a device may be software controlled to occur automatically. In such instances, the network manager may program a system to periodically cycle through the WLAN, converting APs to Probe devices for the purpose of collecting a complete picture of the operating characteristics of the WLAN. Thus it can be seen that the present invention provides a mechanism by which a WLAN may be monitored for performance and security purposes without dedicated Probe devices or other types of manual intervention.
Whichever method is used to cause the conversion to happen, in
Referring back to
When it is determined at step 5 that the Probe operation for the device is completed, optional step 6 may be performed to convert the Probe device back into an Access Point. Note that the performance of this step is not a requirement of the invention, as a user may choose to convert and AP to a permanent Probe, and thus not require that the Probe be re-converted. Because the step is optional, it is showed as dashed box 6 in
For purposes of clarity, the steps performed in converting a Probe device into an AP device will now be described with reference to
More particularly, referring to
For each band, scan Intervals occur periodically. During a Scan Interval (step 20), the AP 12a passively scans all channels which the AP supports within the band (step 22). The AP 12a gathers a list of active APs 12a, the channels on which they are operating, and the power at which the beacons from each AP 12 was heard. This information is used to build a table called a channel map 24 (step 26), which contains a list of all APs 12a heard from, the channel on which they were heard, and the signal strength at which they were heard. There is a separate channel map 24 for each band. The AP 12a sorts the channel map to produce a list of APs 12 in ascending order of power level (step 28).
Referring to
If the AP 12a selected a channel having the weakest signal strength, the APa 12 notes the channel-ID of the channel that it has selected, the received power level on the channel, and the AP-ID of the AP that generated that power level (step 40). It will use the power level value as a baseline against which to detect increases in received power on its selected channel. If the AP 12a selected an empty channel, the baseline power level will be the AP's noise floor.
The AP 12a then advertises its intention to use the selected channel by periodically transmitting Dynamic Radio Controlled Protocol Claim messages (described in the Backes application) during the claiming period (step 42). Claim messages are transmitted at full power to ‘claim’ the channel. During this claiming period, the AP 12 receives all Beacons, DRCP Claim messages, and DRCP Announce messages transmitted on the currently chosen channel (step 44) and uses the information contained therein to build an “Other APs” table 46 (
If another AP 12 starts to radiate significant energy on the selected channel, one of two events must have occurred. The new AP 12 is either not running DRCP, or a conflict has occurred with another DRCP-active AP, where a race condition has caused the other DRCP-active AP to select the same channel at the same time. This is called a Channel Selection Collision (CSC).
At the end of the claim period (step 50), the AP 12 stops sending Claim messages and evaluates the information it has collected, its CSC data, to determine if a CSC has occurred. It looks to see if the received power in any entry is greater than the baseline power level it recorded for the channel (step 52). If so, it looks to see if the received power is exceeded in at least half of the power level values for the entry (step 54). If so, the AP 12 checks to see whether the AP in the entry is DRCP capable (step 56).
If the other AP is not DRCP active, the AP 12 defers to the non-DRCP-active AP and starts the entire channel selection process over again.
If the other AP is DRCP-active, then a CSC is assumed to have occurred. When a CSC has occurred, the MAC address of the other AP is compared to the MAC Address of this AP 12. If the MAC address of this AP 12 is numerically higher than the observed MAC address (step 58), this AP 12 starts the channel selection process over again.
If at the end of the claiming period, the AP has succeeded in claiming the selected channel, it begins running on the channel. The AP starts beaconing, begins sending DRCP Announce messages, and prepares to enter the Optimization stage in order to run its Auction and Power Adjustment functions (step 60).
It should be noted that although the above embodiments have been described as though the AP was a single radio device, different AP devices include functionality to support a range of radio devices transmitting on frequencies and using protocols of the 802.11a, 802.11b, 802.11g WLAN standards. When using the present invention on an AP device that supports multiple RF ranges, it should be noted that the entire AP device need not be transitioned to a Probe device. Rather, the present invention may be modified to include commands such as ‘Probe A’, indicating that an AP device should modify its operation to serve as a Probe Device for 802.11a channels, and as AP devices for any other channels that it supports. Other commands may also be provided, such as ‘Probe All’ indicating all channels should be modified to Probes, ‘Probe B’ or ‘Probe G’, for converting AP 802.11b and 802.11g channel devices, respectively, into Probe devices for the respective channels.
Accordingly a method and system for temporary or permanent conversion of an AP device into Probe device has been shown and described. The conversion may occur as a result of an external command issued by a third party, or alternatively automatically. The automatic conversion may occur due to routine monitoring of the WLAN, or alternatively upon detection of performance or security issues in the network. Converting existing APs into Probe devices is superior to deploying dedicated Probes in the network, because to cover all of the areas within reach of the APs would require a lot of Probes, or otherwise a single Probe would have to be moved manually to various parts of the network in turn to achieve the same coverage. The present invention overcomes these obstacles to provide an economical and easy to implement network monitoring solution.
Having described an exemplary embodiment of the present invention, it will be appreciated that various modifications may be made without diverging from the spirit and scope of the invention. For example,
Those skilled in the art should readily appreciate that programs defining the functions of the present invention can be delivered to a computer in many forms; including, but not limited to: (a) information permanently stored on non-writable storage media (e.g. read only memory devices within a computer such as ROM or CD-ROM disks readable by a computer I/O attachment); (b) information alterably stored on writable storage media (e.g. floppy disks and hard drives); or (c) information conveyed to a computer through communication media for example using baseband signaling or broadband signaling techniques, including carrier wave signaling techniques, such as over computer or telephone networks via a modem.
While the invention is described through the above exemplary embodiments, it will be understood by those of ordinary skill in the art that modification to and variation of the illustrated embodiments may be made without departing from the inventive concepts herein disclosed. Moreover, while the preferred embodiments are described in connection with various illustrative program command structures, one skilled in the art will recognize that the system may be embodied using a variety of specific command structures. Accordingly, the invention should not be viewed as limited except by the scope and spirit of the appended claims.