10.03.2013 Views

Sniffer® Portable Professional User's Guide - NetScout

Sniffer® Portable Professional User's Guide - NetScout

Sniffer® Portable Professional User's Guide - NetScout

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 5<br />

80 Sniffer <strong>Portable</strong> <strong>Professional</strong><br />

Table 5-3. Management Frame Counters in the Dashboard’s 802.11<br />

Tab (2 of 2)<br />

Counter Description<br />

Probe Requests The number of Probe Requests observed on<br />

the wireless network. Stations send Probe<br />

Requests to other stations or access points<br />

to retrieve information (for example, to<br />

determine whether a given access point is<br />

open for new associations).<br />

Probe Responses The number of Probe Responses observed<br />

on the wireless network. Stations and access<br />

points send Probe Responses containing<br />

requested parameters in response to Probe<br />

Requests.<br />

Beacons The number of Beacon packets observed on<br />

the wireless network. Access points send<br />

beacon packets at a regular interval to<br />

synchronize timing between stations on the<br />

same network.<br />

ATIMs The number of Announcement Traffic<br />

Indication Messages (ATIMs) observed on<br />

the wireless network. Stations send ATIMs<br />

immediately after a beacon packet<br />

transmission to inform other stations that<br />

they have data to transmit to them.<br />

Disassociations The number of Disassociation packets<br />

observed on the wireless network. Stations<br />

and access points send Disassociations to<br />

end associations.<br />

Authentications The number of Authentication packets<br />

observed on the wireless network. Stations<br />

and access points send Authentications to<br />

identify one another securely.<br />

Deauthentications The number of Deauthentication packets<br />

observed on the wireless network. Stations<br />

and access points send Deauthentications to<br />

end secure communications with one<br />

another.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!