Understanding the Fundamentals of WiFi Probe Request and Response Management Frames: WLAN Discovery methods



For the Wireless devices to efficiently discover and connect to available networks, there are two fundamental management frames that plays and important roles; Probe Request and Probe Response frames. Let's explore how these management frames work together to help your devices find and connect to wireless networks.

What is Probe Request?


Probe Requests are management frames sent by a Wireless Client device or a Station (STA) when searching for wireless networks. Think of them as your device calling out "Hello, is anyone there?" This frame serves two main purposes:

  • Finding a specific network, you have connected in the past.
  • Discovering all available networks in coverage area of the device.

Types of Probe Requests


The types of Probe Request is dictated by the length of the SSID field in the Probe Request. There are two types of Probe Requests: 
  • Directed Probe Request
  • Broadcast Probe Request 
 
Directed Probe Requests: When your device is looking for a specific network, it sends a directed request containing that network's SSID. The Access Points that are configured with the Specific SSID will respond to the Probe Request. In this case SSID field will have a length greater than Zero as shown in below example Wireshark Sniffer.

Wireshark Filter : wlan.fc.type_subtype eq 4




Broadcast Probe Requests: This type of Probe Request is also known as "Wild card" or Broadcast requests. In this case the SSID field in the Probe Request is empty as shown in the below example Wireshark Sniffer and all Access points receiving this request will respond with all SSIDs (excluding non-hidden) 



What is Probe Response?


When a wireless access point (AP) receives a Probe Request, it responds with a Probe Response frame. This Probe Response frame contains almost the same information as the Beacon Frame. Following information about the Wireless network is part of the Probe Response:

Fixed Fields of Probe Response:

  • Timestamp 
  • Beacon Interval in milliseconds
  • Capability Information

Tagged Parameters:

  • SSID Parameters
  • Supported Rates
  • PHY Parameter Sets
In addition to above parameters, it also includes additional information elements that can assist Stations based on their capabilities and standards. Example:
  • IEEE 802.11d networks include Country information element.
  • IEEE 802.11h networks provide Power Constraints, supported Channel information, Channel Switch Announcement etc.
  • IEEE 802.11e networks share QoS load data.
  • IEEE 802.11g networks may include ERP information.
  • IEEE 802.11i, provides the RSN information element.
  • HT,VHT, HE Capability information. 
  • Vendor Specific Information
Here is a sample Wireshark example of Probe Response:

Wireshark Filter : wlan.fc.type_subtype eq 4


For Details on these Fixed and Tagged Parameters, refer to my blog on Wireless Fundamentals: Beacon

How does it all works together

The interaction between Probe Requests and Responses follows below pattern:
  • Your Wireless device sends out a Probe Request
  • Access points or STA that meet the criteria(Directed or Broadcast) respond
  • In a traditional infrastructure network (BSS), the AP always responds to the probe request.
  • In IBSS (All Stations), the Mobile Station that have sent the latest Beacon would respond.   
  • In more complex scenarios (like mesh networks), multiple devices might respond

Conclusion:

Probe Request and Response frames are the fundamental to how wireless devices(Phones, Laptops, Handhelds etc.) discover and connect to networks. Understanding their behavior helps network administrators optimize their wireless infrastructure and troubleshoot connectivity issues more effectively.


Ref: https://www.cwnp.com/certifications/cwap


Comments

Popular posts from this blog

Understanding RSSI and LQI Metrics of IOT

Understanding "Invalid FTE" Error with 802.11r Roaming

Association Failures with Legacy Printers due to Management Frame Protection- A Technical Analysis