Wireless: Difference between revisions
m (→See Also: fix link, capitalization) |
No edit summary |
||
(4 intermediate revisions by 3 users not shown) | |||
Line 1: | Line 1: | ||
{{outdated}} |
|||
{{redirects-here|[[Antenna]]}} |
{{redirects-here|[[Antenna]]}} |
||
<noinclude>{{Translations}}</noinclude> |
<noinclude>{{Translations}}</noinclude> |
||
Line 60: | Line 61: | ||
=== Capturing wireless traffic on the xo === |
=== Capturing wireless traffic on the xo === |
||
⚫ | |||
Here are the steps to capture wireless traffic on the xo: |
|||
⚫ | |||
⚫ | |||
⚫ | |||
yum install tcpdump |
yum install tcpdump |
||
Line 70: | Line 69: | ||
killall NetworkManager |
killall NetworkManager |
||
Then put both interfaces down and |
Then put both interfaces down and select which classes of traffic you want to capture: |
||
ifconfig msh0 down |
ifconfig msh0 down |
||
ifconfig eth0 down |
ifconfig eth0 down |
||
Line 90: | Line 89: | ||
tcpdump -i rtap0 -s 128 -w capture.dump |
tcpdump -i rtap0 -s 128 -w capture.dump |
||
Note: In this case, you'll capture only the first 128 bytes of each frame ( |
Note: In this case, you'll capture only the first 128 bytes of each frame (this is generally enough and saves space). Once done stop tcpdump with CTRL-C. |
||
You may open your capture with any tool able to decode the tcpdump file format (example: wireshark) |
You may open your capture with any tool able to decode the tcpdump file format (example: wireshark)or use tcpdump itself: |
||
tcpdump -r capture.dump |
tcpdump -r capture.dump |
||
Line 99: | Line 98: | ||
http://dev.laptop.org/~javier/patches/wireshark-0.99.5-fw-5.220.11-support.patch'' |
http://dev.laptop.org/~javier/patches/wireshark-0.99.5-fw-5.220.11-support.patch'' |
||
To |
To analyze airtime consumed by a given type of traffic, check [http://wiki.laptop.org/go/Wireless_Artime_Analysis this page] |
||
== Antenna Reliability == |
== Antenna Reliability == |
||
Line 108: | Line 107: | ||
==See also== |
==See also== |
||
* [[Wifi Connectivity]] in the support FAQ |
|||
* [[Wireless access point compatibility]] |
* [[Wireless access point compatibility]] |
||
* [[Wireless network hacking]] |
* [[Wireless network hacking]] |
||
Line 113: | Line 113: | ||
==External links== |
==External links== |
||
* [http://www.open80211s.org/ Open 802.11s] |
* [http://www.open80211s.org/ Open 802.11s] |
||
* [http://www.hpl.hp.com/personal/Jean_Tourrilhes/Linux/Tools.html Wireless Tools for Linux]. |
|||
[[Category:OS]] |
[[Category:OS]] |
Latest revision as of 02:53, 13 August 2013
Design Goals
OLPC's laptops will be deployed in places where there will be very little or no infrastructure at all. We wanted to make sure that the laptops could connect to other laptops in their vicinity regardless of the presence or not of connectivity infrastructure. We also wanted to help kids share Internet connectivity without any additional infrastructure.
It became very clear that the utility of the usual laptop wired connectivity options (ethernet, modem) will be very limited under those constraints and a relative waste of our limited bill of materials budget. Instead we have to concentrate our resources to increase the utility and functionality of the wireless network adapter.
To achieve our design goals we chose to add self organizing multihop (mesh) networking capabilities to the laptop's network adapter. The constraints imposed by our Mesh Network Details mandate the use of System on Chip (SoC) Wireless Adapter, with the mesh networking protocol running directly on the adapter's CPU.
Other wiki resources are:
Network Adapter
- Marvell 88W8388
- Has onboard ARM 9 processor, ROM and RAM.
- 802.11b/g radio
- Allows for promiscous mode (RFMON)
- Dual adjustable, rotating diversity antennae ("Bunny Ears")
- Further details on the chip can be learned by reading Marvell adds TCP/IP offload support to WLAN chip
Mesh Wireless
The Mesh wireless protocol is very nearly an implementation of the IEEE 802.11s draft.
User Experience
There is complexity in properly configuring the wireless network in the variety of use scenarios that our children will encounter. Our bias is towards making efficient use of the mesh, but in some situations, our infrastructure mode will be used. In those cases, the laptop will offer mesh portal (MPP) services to other laptops nearby. If no mesh or access point is visible, then the laptop will become a mesh point on Channel 1.
We use channels 1, 6, and 11 when possible. This lets us use three channels with essentially no overlap. Wireless routers using any of these three channels appear in the Neighborhood View.
The basic flow of making a network connection:
- Start with Channel 1:
- Try DHCP. If successful, then CONNECTED/DONE (DHCP)
- Try AUTOID. If successful, then CONNECTED/DONE (AUTOID)
- Goto Channel 11:
- Try DHCP. If successful, then CONNECTED/DONE (DHCP)
- Try AUTOID. If successful, then CONNECTED/DONE (AUTOID)
- Goto Channel 6
- Try DHCP. If successful, then CONNECTED/DONE (DHCP)
- Try AUTOID. If successful, then CONNECTED/DONE (AUTOID)
- Try last successful AP
- If successful, then CONNECTED; offer MPP/DONE.
- (if not yet DONE) REPEAT DHCP/AUTOID loop on all channels.
- (if not yet DONE) Become Mesh Point on Channel 1.
Rollover will reveal the difference between DHCP and AUTOID; IP address; Gateway; DNS;. AP or Mesh; ESSID; Channel Number; and Signal Strength (AP only).
- The AP icon on Mesh View should distinguish between access points that are open vs. requiring a key.
- The AP icon on Mesh View should distinguish between access points on Channels 1,11,6 and other channels.
- The AP icon should indicate that you are offering MPP service to others.
- An ethernet icon should indicate you are offering MPP service to others.
From the Mesh View, you should be able to jump directly into Steps 1, 4, or 6 above (search for mesh, select AP, select mesh point).
Capturing wireless traffic on the xo
Some builds come with a script named "olpc-netcapture" that will capture traffic for 30 seconds. If your build does not have such script, then you may still follow the procedure below:
If your build does not come with tcpdump, you can install it with yum:
yum install tcpdump
First of all, kill NetworkManager
killall NetworkManager
Then put both interfaces down and select which classes of traffic you want to capture:
ifconfig msh0 down ifconfig eth0 down echo $TRAFFIC_MASK > /sys/class/net/eth0/lbs_rtap
where:
- TRAFFIC_MASK bits:
- Data frames: 0x1
- Mgmt frames but beacons: 0x2
- Beacons: 0x4
- Examples:
- to capture all traffic: echo 0x7 > /sys/class/net/eth0/lbs_rtap
- to capture only beacons: echo 0x4 > /sys/class/net/eth0/lbs_rtap
- TRAFFIC_MASK bits:
Now, you need to bring the monitoring interface up
ifconfig rtap0 up
And finally capture the traffic itself with tcpdump
tcpdump -i rtap0 -s 128 -w capture.dump
Note: In this case, you'll capture only the first 128 bytes of each frame (this is generally enough and saves space). Once done stop tcpdump with CTRL-C.
You may open your capture with any tool able to decode the tcpdump file format (example: wireshark)or use tcpdump itself:
tcpdump -r capture.dump
To interpret mesh traffic correctly, you will want to compile wireshark with this patch:
http://dev.laptop.org/~javier/patches/wireshark-0.99.5-fw-5.220.11-support.patch
To analyze airtime consumed by a given type of traffic, check this page
Antenna Reliability
The antenna "ears" have been subjected to drop testing in both the open and close positions, and survive multiple drops onto concrete from desk height. They are made of rubber surface over a polycarbonate center section, allowing them to flex upon impact.
In the event of antenna breakage, there are two antennae. A laptop will continue to function satisfactorily with a single ear in a school setting, and should suffer only slight degradation in performance in more remote settings. The ear was redesigned late in the design process (C-build and later) to simplify repair --- replacing an ear now requires the removal of only six screws, thanks to a connector embedded in the rotary hinge.
See also
- Wifi Connectivity in the support FAQ
- Wireless access point compatibility
- Wireless network hacking