Changes between Version 1 and Version 2 of WirelessTraces


Ignore:
Timestamp:
03/06/07 13:11:52 (14 years ago)
Author:
smr26
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • WirelessTraces

    v1 v2  
    2525
    2626=== Setting up !MadWiFi for Radiotap ===
    27 Create a new Monitor mode VAP:
     27 * Create a new Monitor mode VAP:
    2828
    29 {{{wlanconfig mon0 create wlandev wifi0 wlanmode mon}}} (where mon0 is the name of the monitor mode vap, and wifi0 is the name of the !MadWiFi base device)
     29{{{
     30wlanconfig mon0 create wlandev wifi0 wlanmode mon
     31}}}
     32 (where mon0 is the name of the monitor mode vap, and wifi0 is the name of the !MadWiFi base device)
    3033
    31 Enable Radiotap encapsulation:
     34 * Enable Radiotap encapsulation:
    3235
    33 {{{echo '803' > /proc/sys/net/mon0/dev_type}}}
     36{{{
     37echo '803' > /proc/sys/net/mon0/dev_type
     38}}}
    3439
    35 Capture packets using either `tcpdump -w` or `tracesplit`, e.g.
     40 * Capture packets using either `tcpdump -w` or `tracesplit`, e.g.
    3641
    37 {{{tracesplit int:mon0 pcapfile:trace.pcap}}}
     42{{{
     43tracesplit int:mon0 pcapfile:trace.pcap
     44}}}
    3845
    3946You can then open the trace `trace.pcap` with your libtrace application and use the `trace_get_wireless_*` methods to extract per-packet metadata.
    4047
     48== tracedump ==
    4149
     50The [TraceDump tracedump] tool has been updated to decode both Radiotap and IEEE 802.11 frames. For example, run `tracedump pcapfile:trace.pcap` and you will get the following output:
     51
     52{{{
     53Thu Mar  1 13:42:24 2007
     54 Radiotap: version: 0, length: 32, fields: 0x00586f
     55 Radiotap: TSFT = 160302265 microseconds
     56 Radiotap: Flags = 0x02
     57 Radiotap: Rate = 12000 kbps
     58 Radiotap: Freq = 2437 MHz, ChanFlags: 0x0480
     59 Radiotap: Signal = -79 dBm
     60 Radiotap: Noise = -96 dBm
     61 Radiotap: Antenna = 1
     62 Radiotap: Signal = 17 dB
     63 Radiotap: Frame Check Sequence = 0x59dc1264
     64 802.11MAC: proto = 0, type = 2, subtype = 8, flags = toDS retry
     65 802.11MAC: Data frame: QoS Data
     66 802.11MAC: duration = 52 us
     67 802.11MAC: fragment no. = 0, sequence no. = 3887
     68 802.11MAC: DA      = 00:0b:6b:34:87:da
     69 802.11MAC: SA      = 00:0b:6b:34:88:3d
     70 802.11MAC: BSSID   = 00:0b:6b:34:87:da
     71 802.11e: QoS = 0x0000
     72 802.11MAC: Payload ethertype = 0x0800
     73 IP: Header Len 20 Ver 4 DSCP 00 ECN 0 Total Length 1500
     74 IP: Id 25416 Fragoff 32
     75 IP: TTL 64 Proto 1 (icmp) Checksum 35178
     76 IP: Source 192.168.1.2 Destination 192.168.1.1
     77 ICMP: Type: 8 (ICMP Echo Request) Sequence: 1
     78}}}
     79
     80