Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-0.8 required=3.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_PASS,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 32441C43441 for ; Wed, 10 Oct 2018 20:44:33 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id DDA7020870 for ; Wed, 10 Oct 2018 20:44:32 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org DDA7020870 Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=candelatech.com Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=linux-wireless-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725868AbeJKEIW (ORCPT ); Thu, 11 Oct 2018 00:08:22 -0400 Received: from mail2.candelatech.com ([208.74.158.173]:54626 "EHLO mail2.candelatech.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725822AbeJKEIW (ORCPT ); Thu, 11 Oct 2018 00:08:22 -0400 Received: from [192.168.100.149] (firewall.candelatech.com [50.251.239.81]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail2.candelatech.com (Postfix) with ESMTPSA id 075F540A539; Wed, 10 Oct 2018 13:44:29 -0700 (PDT) Subject: Re: Tool to debug wifi pkt sniffs? To: Dave Taht References: <87pnwqaiso.fsf@toke.dk> <01b77936-f6d4-271a-d7d2-0fd2cf70f7bd@candelatech.com> Cc: =?UTF-8?Q?Toke_H=c3=b8iland-J=c3=b8rgensen?= , linux-wireless From: Ben Greear Organization: Candela Technologies Message-ID: Date: Wed, 10 Oct 2018 13:44:28 -0700 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Thunderbird/45.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8bit Sender: linux-wireless-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org On 10/10/2018 12:13 PM, Dave Taht wrote: > On Wed, Oct 10, 2018 at 10:10 AM Ben Greear wrote: >> >> On 10/03/2018 01:29 PM, Dave Taht wrote: >>> On Wed, Oct 3, 2018 at 1:16 PM Toke Høiland-Jørgensen wrote: >>>> >>>> Ben Greear writes: >>>> >>>>> Hello, >>>>> >>>>> I often find myself wanting to figure out what equipment is to blame (and why) >>>>> in a wifi environment. >>>>> >>>>> I am thinking writing a tool that would parse a pcap file and look at frames >>>>> in enough detail to flag block-ack bugs, rate-ctrl bugs, guess at the sniffer's >>>>> capture ability, etc. >>>>> >>>>> Does anyone have anything already written that they would like to share, or know >>>>> of projects that might already do some of this? >>>> >>>> Not sure if this fits your criteria, but Sven's tool to create airtime >>>> charts from packet sniffing data immediately came to mind: >>>> >>>> https://github.com/cloudtrax/airtime-pie-chart >>> >>> I have used that. Oy, it's a PITA. Some of kathie's code over here >>> (example: https://github.com/pollere/pping ) uses the slightly less >>> painful http://libtins.github.io/ library for parsing packets. >> >> I couldn't find anything that did what I wanted, so I wrote my own. >> >> The (perl) code is in the wifi-diag directory of this public repo: >> >> https://github.com/greearb/lanforge-scripts >> >> The rest of the scripts in that repo are not related to the wifi-diag script, so just ignore those. >> >> Here is example output for what I have so far: >> >> https://www.candelatech.com/oss/wifi-diag/netgear-up-5s/index.html > > I *miss* writing in perl. :) > > My guess from looking at that output that that was a udp flood test. > Do I win the internets? Yes, UDP upload test with 20 emulated stations, sending ~500 byte UDP frames. One thing we notice in the case we are debugging, is that the average time from transmitter station device receiving BA from the AP to the transmitter station device putting the next AMPDU frame on air is 0.728ms for the problem AP, and 0.448ms for the good AP. I checked that the wmm config in the beacons for the two APs is the same. I am at a loss as to what could cause this delay, other than possibly the problem AP has a funky transmitter than puts a bit of extra noise on the air after it is done transmitting a frame? The problem AP also has 5% retransmits vs about 2% for the good AP, and problem AP is typically using MCS8 instead of MCS9, but even so, I do not see how that would explain the extra BA to AMPDU delay. Thanks, Ben -- Ben Greear Candela Technologies Inc http://www.candelatech.com