Wi-Fi Roaming Performance in MDUs: Navigating Seamless Connectivity

Wi-Fi Roaming Performance in MDUs: Navigating Seamless Connectivity



Introduction: The Quest for Uninterrupted Connectivity

At 802.11 Networks Corp, we’re driven by a passion for Enterprise Wireless. We believe in demystifying complex topics, diving deep into the technical intricacies, and presenting our findings in a way that sparks conversation and propels industry-wide improvements. Today, we’re focusing on a critical aspect of modern living: Wi-Fi roaming in Multi-Dwelling Units (MDUs).

Think bustling apartment complexes, vibrant student housing, comfortable senior living facilities, and modern condominiums. Why this focus?

  • Ubiquity of MDU Living: A significant portion of the population resides in MDUs. In the US, estimates range from 30% to 42%, highlighting the sheer scale of this living arrangement.
  • The Promise of Managed Wi-Fi: MDUs offer a unique opportunity for property-wide, managed Wi-Fi solutions. When implemented effectively, these systems deliver substantial technical and economic advantages to residents.

A cornerstone of a successful managed Wi-Fi deployment is seamless roaming. Residents expect their connected devices to transition smoothly between access points (APs) as they move throughout the property. This eliminates frustrating disconnections and ensures a consistent user experience.

In this post, we’ll dissect common MDU deployment architectures, exploring their strengths and weaknesses. We’ll start by differentiating between managed and non-managed environments, then delve into four specific client authentication and roaming scenarios. Our goal is not to declare a “winner” but to foster a constructive dialogue that enhances human connectivity.

Understanding MDU Wi-Fi Architectures

To fully understand the results of the performance test, we must first understand the architectures that are being tested.

1. Traditional Residential Deployments: The “Home Router” Approach

  • Each apartment operates its own dedicated home router.
  • These networks typically feature:
    • A private SSID secured with WPA2-Personal for individual residents.
    • A universal SSID, often utilizing Passpoint with pre-installed profiles, enabling limited roaming across the complex.
  • Technical Characteristics:
    • NAT (Network Address Translation) is standard, isolating each apartment’s network.
    • 802.11r (Fast Transition) is generally absent.
    • Some APs may implement key caching to expedite re-authentication for returning devices.
  • Limitations:
    • Limited roaming performance.
    • Interference between many routers.
    • Difficult to manage as a whole.

2. Managed MDU Deployments: Centralized Control

  • A professionally designed RF network covers the entire property.
  • APs are strategically placed based on a thorough RF survey, ensuring optimal coverage.
  • A single, unified SSID is broadcast throughout the property.
  • Technical Characteristics:
    • VLANs (Virtual Local Area Networks) are employed to segregate resident traffic, ensuring privacy and security.
    • Authentication options include:
      • Passpoint-like systems with pre-installed profiles (ideal for smartphones and laptops).
      • Multi-PSK (MPSK) solutions with RADIUS authentication (offering a balance of security and ease of use, and better IoT compatibility).
  • Key Points:
    • Allows 802.11r to be implemented
    • Centralized management and troubleshooting.
    • Enhanced security and privacy relative to using a single, shared PSK.
    • Ability to fine tune the network.

Quantifying Roaming Performance: The Test Bed

To objectively assess roaming performance, we constructed a test bed that replicated the scenarios described above. We distilled the myriad of possible configurations into four representative cases:

  1. WPA2-Enterprise (TLS) + Bridged + 802.11r:
    • Represents a managed MDU with Passpoint or similar pre-installed profiles.
    • Bridged network: Clients retain their IP address during roaming.
    • 802.11r: Rapid authentication using R1 keys distributed via the Distribution System (DS).
  2. WPA2-Enterprise (TLS) + NAT’d + Key-Caching:
    • Mirrors the universal roaming SSID in traditional residential deployments (e.g., Xfinity Mobile Hotspot).
    • NAT’d network: DHCP lease renewal and Layer 3 (L3) connection break during roaming.
    • Key caching: Speeds up re-authentication for returning clients, but no 802.11r.
  3. MPSK-RADIUS + Bridged + 802.11r (or Key-Caching):
    • Represents a managed MDU with MPSK and RADIUS authentication.
    • Bridged network: Maintains L3 connection.
    • 802.11r availability based on capabilities of backend MPSK solution used
    • Each resident gets a unique PSK tied to a VLAN.
  4. MPSK-RADIUS + NAT’d + Key-Caching:
    • While less common, it was tested to provide a complete view.
    • NAT’d network.
    • Key Caching.

The Test Setup: Precision and Control

  • Two Enterprise OpenWiFi APs broadcasted the four SSIDs, each corresponding to a test case.
  • The APs were connected to a Linux-based router (providing DHCP, RADIUS, and NAT) via a switch.
  • FreeRADIUS was used for RADIUS authentication.
  • All tests were conducted in RF isolation chambers to ensure accuracy.
  • Roaming events were manually triggered for consistent results.

Test Architecture Diagram:

A diagram of a computer network

AI-generated content may be incorrect.

Test Execution: Measuring Roaming Dynamics

  • Each test began with a pre-authenticated client connected to AP1.
  • A continuous ping to 8.8.8.8 (Google DNS) was executed with a 1-second interval.
  • Four manual roaming events were triggered during the 100-ping test.
  • Latency and packet loss were recorded for each scenario.

Results: A Clear Picture of Performance

  • WPA2-Enterprise (TLS) + Bridged + 802.11r:
    • Packet Loss: 4%
    • Average Latency: 16.98 ms
  • WPA2-Enterprise (TLS) + NAT’d + Key-Caching:
    • Packet Loss: 12%
    • Average Latency: 19.91 ms
  • MPSK-RADIUS + Bridged + 802.11r:
    • Packet Loss: 1%
    • Average Latency: 18.20 ms
  • MPSK-RADIUS + NAT’d + Key-Caching:
    • Packet Loss: 9%
    • Average Latency: 18.07 ms

Analysis and Conclusion: Optimizing MDU Wi-Fi

Why Roaming Matters: Seamless roaming is essential for a positive user experience in MDUs. Disruptions lead to frustration and decreased productivity.

Best Solutions:

  • Managed MDUs:
    • Regardless of the authentication method (MPSK/WPA2-Enterprise), Bridged networks with 802.11r offer excellent performance.
    • MPSK-RADIUS with VLANs adds user-friendlinesss for IoT devices
  • Traditional Residential:
    • NAT’d networks with key caching are common, but less ideal.
    • Requires separate, universal SSID for Roaming across property.

Client Considerations:

  • Passpoint benefits devices with pre-installed profiles.
  • MPSK-RADIUS accommodates IoT and other devices with limited capabilities.

Comparison Matrix:

FeatureWPA2-Enterprise (TLS) + Bridged + 802.11rWPA2-Enterprise (TLS) + NAT’d + Key-CachingMPSK-RADIUS + Bridged + 802.11rMPSK-RADIUS + NAT’d + Key-Caching
Network ModeBridgedNAT’dBridgedNAT’d
Roaming Support802.11rKey-Caching802.11r (partial)Key-Caching
AuthenticationPasspoint (pre-installed profiles)Passpoint (pre-installed profiles)MPSK MPSK 
Traffic SegmentationVLANsPer-user NATVLANsPer-user NAT
Packet Loss4%12%1%9%
Average Latency (ms)16.9819.9118.2018.07
Best Use CaseManaged MDU, devices with Passpoint profilesTraditional Residential Model (Separate NAT’d Home Router per unit)Managed MDU, diverse client device typesLess Common deployment use cases. TBD.
ProsLowest latency, seamless roamingSimpler NAT isolationVery low packet loss, diverse client ecosystemTBD
ConsPasspoint reliance can limit IoT device supportHigher packet loss, DHCP renewalsPartial 802.11r supportHigher packet loss compared to Bridged 802.11r

Key Takeaway: By understanding these technical nuances, Professional WLAN experts, like 802.11 Networks Corp, can help ISPs & MDU Network Operators to deliver exceptional roaming experiences.

Exploring QoS, Traffic Shaping, and AQM: Insights from Real-World Testing

Exploring QoS, Traffic Shaping, and AQM: Insights from Real-World Testing

As part of our ongoing research at 802.11 Networks, the team conducted an in-depth traffic shaping and QoS (Quality of Service) test to evaluate how different traffic prioritization strategies perform in real-world conditions. This research aims to help our customers better understand their networks and make educated decisions on configurations that ensure optimal performance.

Test Setup Highlights:

  • Total Clients: 30
    • Zoom Clients: 3 (Simulating Zoom calls with 3Mbps uplink and downlink traffic per client)
    • Streaming Clients: 27 (Simulating video streaming with uplink traffic ranging between 128Kbps–2Mbps and downlink traffic between 1.5Mbps–30Mbps)
  • Protocol: TCP
  • Environment: OTA testing inside an RF isolation chamber for accurate and interference-free results
  • Access Point: CIG WF196, running OpenWiFi v3.2.0
  • Channel: 48/20MHz
  • Average RSSI: -60dBm
  • WAN Configuration: Simulated Cable Modem link using Linux TC, with 20Mbps uplink and 1000Mbps downlink to replicate a typical Comcast subscription
  • AQM:
    • FQ-CoDel
    • CAKE

The test environment included a traffic generation server connected to the AP’s WAN link via a Linux box simulating the Cable Modem WAN link. This controlled environment allowed us to precisely measure the effects of various QoS configurations on network performance.

Test Cases Conducted:

  • FQ-CoDel with no DSCP marking: Default case with no configurations.

WAN link Traffic

Zoom Client1 Throughput

Zoom Client1 Latency

Zoom Client2 Throughput

Zoom Client2 Latency

Zoom Client3 Throughput

Zoom Client3 Latency

  • FQ-CoDel with marked uplink: Zoom clients’ uplink traffic marked as video with DSCP CS4.

WAN Link Traffic

Zoom Client1 Throughput

Zoom Client1 Latency

Zoom Client2 Throughput

Zoom Client2 Latency

Zoom Client3 Throughput

Zoom Client3 Latency

  • CAKE with eBPF reclassification: No DSCP marking from side clients, but downlink traffic reclassified as CS5 using eBPF programs running in the AP kernel.

WAN Link Traffic

Zoom Client1 Throughput

Zoom Client1 Latency

Zoom Client1 Throughput

Zoom Client2 Latency

Zoom Client3 Throughput

Zoom Client3 Latency

  • CAKE with eBPF reclassification + marked uplink : Zoom clients’ uplink traffic tagged with DSCP CS4, and downlink traffic reclassified as CS5 using eBPF programs on the AP kernel.

WAN Link Traffic

Zoom Client1 Throughput

Zoom Client1 Latency

Zoom Client2 Throughput

Zoom Client2 Latency

Zoom Client3 Throughput

Zoom Client3 Latency

In all test cases, 802.11e WMM was enabled on the AP to allow for hardware-assisted prioritization of traffic.

Key Takeaways:

  • Case 4 consistently delivered the best results, with:
    • Improved guaranteed throughput for the Zoom clients’ vs the streaming clients
    • Reduced latency for Zoom clients, ensuring call quality
  • These results highlight the power of combining advanced queuing mechanisms like CAKE with intelligent traffic classification using DSCP and eBPF.

Why This Matters: At 802.11 Networks, we specialize in wireless testing and performance optimization. This research underscores our commitment to helping customers achieve enterprise-grade performance using open-source hardware and intelligent network configurations. By understanding how QoS mechanisms like AQM, DSCP tagging, and WMM affect real-world traffic, network administrators can make informed decisions to enhance user experiences and ensure their networks perform at their peak.

If you’re interested in learning more about these tests or how they can be applied to your network, feel free to reach out or follow for updates.

Evaluating Dual WiFi Connectivity on OnePlus 12: Promises vs. Performance

Evaluating Dual WiFi Connectivity on OnePlus 12: Promises vs. Performance

The OnePlus 12 offers a feature called “Dual WiFi Acceleration” under the WiFi Assistant page, claiming to achieve faster internet speeds by connecting to two WiFi networks simultaneously.

To evaluate this claim, I set up an OpenWiFi CIG WF-196 AP, a 4×4 WiFi 6e access point (AP) with support for 160MHz bandwidth on 6GHz, 80MHz on 5GHz, and 40MHz on 2.4GHz. I configured distinct SSIDs for each band:

  • WF-196-6G for 6GHz on channel 33 with 160MHz bandwidth
  • WF-196-5G for 5GHz on channel 116 with 80MHz bandwidth
  • WF-196-2G for 2.4GHz on channel 1 with 40MHz bandwidth

To maximize performance, I paired the OnePlus 12 with the AP using the 6GHz and 2.4GHz bands within an RF isolation chamber.

Although the OnePlus 12 is WiFi 7-capable, this setup does not leverage Multi-Link Operation (MLO). Instead, the phone establishes two separate physical connections over different radios. It appears to use some sort of load-balancing algorithm to optimize throughput across both links.

Using ADB commands and screen mirroring, I ran a speed test to a local Open SpeedTest server hosted on my router. In the video below, you can see how the phone successfully establishes two physical connections, one on wlan0 and the other on wlan1. The “iw dev wlan0/1 link” command outputs, refreshed every second, display packets sent and received over both interfaces.

However, the results were somewhat underwhelming. While the phone successfully maintained connections on both the 6GHz and 2.4GHz bands, traffic was rarely transmitted over both bands simultaneously. As shown in the video, almost all packets during the speed test were sent and received on the 6GHz link.

Another noteworthy observation was the failure of the 2.4GHz link to reach its expected PHY rate of 573.5Mbps on the uplink, despite the short distance and high RSSI. This may be due to degradation in beamforming due to maintaining simultaneous connections on both the 6GHz and 2.4GHz bands.

Despite these limitations, the Dual WiFi Acceleration feature holds promise. If optimized correctly, it could offer WiFi 7-like performance, similar to MLO, on legacy APs.

802.11 Networks – Your Friendly Neighborhood Wireless Experts Episode 1: AP Benchmarking, Optimize Performance, Minimize Cost!

802.11 Networks – Your Friendly Neighborhood Wireless Experts Episode 1: AP Benchmarking, Optimize Performance, Minimize Cost!

Want to know which enterprise class Wi-Fi Access Point offers the best value for your enterprise network?

We recently pitted the Ruckus R350 against the Edgecore EAP101 (running OpenWiFi firmware) in a series of rigorous tests. Here’s what we found:

Setup Environment:

The testing was conducted Over-The-Air (OTA) within an RF isolation chamber to ensure minimal interference and consistency. Both the Ruckus R350 and Edgecore EAP101 were tested on channel 112 with a 20MHz bandwidth.

Equipment Used:

  • LANforge: Used to simulate traffic loads.
  • RSSI Level: Set at -40 dBm for both APs during the capacity test.
  • Attenuation Levels: 0-50dB to cover the RSSI dynamic range between -40dBm to -85dBm.

Observations:

  • Range vs. Rate Test: Both APs performed similarly with the Intel BE200 client across attenuation levels. However, after 20 dB of attenuation, the R350 exhibited a slight dip in throughput performance compared to the EAP101.
  • Capacity Test: As the number of clients increased, both the EAP101 and R350 maintained a similar performance. However the EAP101 began to show a slight advantage (~7Mbps) once the client count surpassed 40.

Conclusion:

It’s clear that both access points delivered solid results here, however subtle differences emerged as we turned up the heat! The Edgecore EAP101, running the OpenWiFi firmware stack, delivered superior performance when compared to the incumbent Ruckus Unit. The EAP101’s ability to maintain throughput as conditions deteriorated highlights its clear value for organizations looking for a cost-effective solution that still delivers performance on par with the industry’s best!

At 802.11 Networks, we combine deep industry domain knowledge with cutting edge tools to ensure our clients are successful.

If you’re ready to transform your wireless network, reach out and let 802.11 Networks deliver a tailored solution that drives results. Our expertise and advanced tools will help you achieve your goals.

#accesspoints #networkperformance #wifi #technology #enterprise #80211Networks #testing #ruckus #TIP #OpenLAN

OpenWiFi Deployments with Multi-PSK Solutions

OpenWiFi Deployments with Multi-PSK Solutions

Recently, solutions offering MPSK-RADIUS services have gained traction in various deployment environments, including MDUs, parks, and venues. These systems provide a versatile solution, enabling user authentication, accounting, and attribute assignments such as VLANs, rate limiting, and quotas, all without requiring EAP support.

Some solutions, like those built on Passpoint 2.0, offer a smoother user experience by enabling seamless connectivity with zero user intervention. However, these solutions require EAP support, which is often lacking in low-end devices such as IoT devices. As a result, these devices cannot take advantage of the benefits provided by Passpoint 2.0-based solutions.

On the other hand, MPSK-RADIUS systems are based on the most common and basic security protocol in Wi-Fi, PSK (Personal), which is supported by virtually every device. In MPSK-RADIUS deployments, from the client’s perspective, there is no visible RADIUS server. Clients perform simple WPA or WPA2 Personal authentication using passphrases entered by the users.

In a traditional MPSK-RADIUS system, the AP does not have knowledge of the passphrase. Instead, a RADIUS server is configured with a list of MAC addresses and their corresponding passphrases. When a new client tries to connect to the AP, it goes through the open system authentication and association processes. Afterward, the AP initiates the 4-way handshake:

  • The AP sends EAPOL-Key message 1, which contains the ANonce.
  • The client generates the SNonce and, using it alongside the passphrase (which is expanded based on the SSID to become the PMK, where PMK = f(PSK, SSID)), generates the PTK and its derivatives (KEK, KCK, and TK).
    • PTK = f(PMK, Client MAC, BSSID, ANonce, SNonce)
  • The client installs the PTK, constructs EAPOL-Key message 2 by adding the SNonce, and uses the KCK to calculate a MIC for the message payload.
  • In a typical WPA2 Personal scenario, the AP would use the same inputs to calculate the PTK and verify the MIC based on the KCK. However, since the passphrase is stored on the RADIUS server, the AP forwards the entire content of EAPOL-Key message 2 to the RADIUS server in an Access-Request message.
  • The RADIUS server searches for a matching MAC address in its list. Once a match is found, it uses the passphrase and the information from EAPOL-Key message 2 to calculate the PMK. The RADIUS server then sends the PMK to the AP in an Access-Accept message.
  • With the PMK, the AP can either use the existing ANonce and SNonce to calculate the PTK and its derivatives or restart the 4-way handshake procedure to obtain new values. This decision typically depends on the configured timeout between EAPOL-Key messages and the time it takes for the RADIUS server to respond with the Access-Accept message.
  • The remainder of the process follows the standard 4-way handshake. The AP installs the PTK, generates the GTK (if this is its first client), encrypts it with the PTK, and sends it in EAPOL-Key message 3.
  • The final message, EAPOL-Key 4, is sent by the client to acknowledge the receipt and installation of the GTK.

This setup works well in controlled environments where the network administrator has a pre-populated list of all client MAC addresses. This scenario is common in enterprise networks where EAP is the primary authentication method, and MPSK-RADIUS is used to onboard IoT devices that do not support 802.1X.

However, a traditional MPSK-RADIUS setup is impractical in environments where the administrator has no control over the devices users bring to the network. A prime example is MDU networks, where the admin needs to manage a pool of PSKs that are not tied to a one-to-one mapping with specific MAC addresses. The system must allow users to authenticate with their assigned PSK, regardless of the MAC address of the device they are using to connect to the network.

MPSK with RADIUS systems offers a solution to the problem mentioned above. These solutions typically consist of multiple components that provide various services. Some of these components include:

  • RADIUS server for authentication and accounting.
  • Databases to manage pools of PSKs and PMKs.
  • Captive portal services for user interaction and onboarding.
  • SMS gateways to assist with new customer onboarding.
  • User portal for customers to manage their subscriptions and change their passwords without requiring network admin intervention.

The workflow for an MPSK-RADIUS solution is similar to the traditional MPSK-RADIUS setup described above, with one key difference: instead of matching the MAC address of the authenticating client to a list of one-to-one MAC-to-PSK pairs, the system calculates the PTK and MIC for all PSKs in the pool and tests them against the MIC sent by the AP in EAPOL-Key message 2. When a match is found, the system forwards the corresponding PMK to the AP. Once the AP receives the PMK, it has two options:

  • Create the GTK and build EAPOL-Key message 3: The AP generates the Group Temporal Key (GTK) if this is the first client or if a new GTK is needed. It then builds EAPOL-Key message 3, encrypts the GTK with the PTK, and sends it to the client.
  • Restart the 4-way handshake: If the time spent waiting for the Access-Accept message with the PMK exceeds the timeout for the 4-way handshake, the AP will restart the handshake process. This ensures that fresh ANonce and SNonce values are used, allowing the process to complete successfully.
MPSK-Radius solution authentication process

One major downside to the process described in the flowchart above is that every time a device roams to a new AP, it must undergo a full RADIUS authentication, which usually takes about one second. A roaming time of one second is unacceptable, as it can disrupt most Layer 3 (L3) connections. To address this, OpenWiFi enables PMKSA key caching for when the client re-roams back to the original AP and supports Fast Transition (FT) with MPSK-RADIUS or PSK-RADIUS when roaming to a new AP. The FT process can be summarized as follows:

  • Client initiates the roaming process by scanning for the next best candidate AP.
  • Client confirms FT support: The client checks whether the target AP supports Over-The-Air (OTA) or Distribution System (DS) FT transition roaming.
  • For Over-The-Air (OTA) FT:
  • Authentication exchange: The client and the target AP exchange FT Authentication frames. The client shares its SNonce, PMK ID, PMK-R0 ID, and Mobility Domain ID with the target AP. In return, the target AP provides its ANonce, PMK ID, PMK-R0 ID, PMK-R1 ID, and Mobility Domain ID.
  • Association exchange: The client and the target AP exchange Association and Reassociation frames. In the Association frames, the client includes the same information as above, along with a MIC generated on the message payload. In the Reassociation frames, the target AP includes the same information plus the GTK.
  • For Distribution System (DS) FT:
  • Authentication exchange: The same information is exchanged in the Authentication frames as in OTA FT, but instead of being sent over the air, the data is embedded in an Action Frame sent to the current AP. The current AP forwards this frame over the distribution system to the target AP. The target AP replies to the client via the distribution system through the current AP.
  • Association and Reassociation exchange: The Association and Reassociation frames remain unchanged, and the procedure follows the same steps as in the OTA case.
Flowchart of the OTA FT process from the IEEE802.11 2020 document
Flowchart of over DS FT process from the IEEE802.11 2020 document

The packet capture screenshots below illustrate how PMKSA key caching and Over-The-Air (OTA) Fast Transition (FT) with MPSK-RADIUS reduce authentication time from approximately 1 second to around 50 milliseconds.

OpenWiFi time with PMKSA Key caching when roaming back to the original AP
OpenWiFi Roaming time with MPSK-Radius with OTA FT enabled.

Turn your OnePlus 12 into a WiFi Sniffer

Turn your OnePlus 12 into a WiFi Sniffer
  • Go to Settings -> About device -> Version, and tap on “Version number” 7 times, this should enable the developer mode.



  • Go to Settings -> Additional settings -> Developer Options, and enable “USB debugging” and “OEM unlocking”.

  • To communicate with the OnePlus phone we will need to install the command-line tool adb (Android Debug Bridge). On a MacOS this can be installed using HomeBrew.

firasshaari@MacBook-Pro-9 ~ % brew install android-platform-tools
  • Connect the device to your laptop using a USB-C to USB-C or USB-C to USB-A cable. Now, you should be able to see your device listed under the connected devices.

firasshaari@MacBook-Pro-9 ~ % adb devices   
List of devices attached
76f80f11	device
  • Reboot the device in the bootloader mode using the below command.

firasshaari@MacBook-Pro-9 ~ % adb reboot bootloader
  • Now in the bootloader mode your device should have a similar screen to the photo below except, its bootloader is still in the locked state.

  • Now using either one of the 2 commands listed below your phone will prompt you that you’re about to unlock the bootloader. Once you accept that, the device will reboot and a message stating that the device cannot be trusted and you will need to set up it again from scratch.

firasshaari@MacBook-Pro-9 ~ % fastboot oem unlock
firasshaari@MacBook-Pro-9 ~ % fastboot flashing unlock
  • After setting up your device, we will need to install the Magisk APK to allow for super user access on the device. Download Magisk-v27.0.apk and push it your device’s SD card using the following command.

firasshaari@MacBook-Pro-9 Downloads % adb push Magisk-v27.0.apk /sdcard/Download/ 
Magisk-v27.0.apk: 1 file pushed, 0 skipped. 42.2 MB/s (12498796 bytes in 0.282s)
  • Use the Files app on the device to install the Magisk APK. In my case you can see that the device is trying to update the already installed APK


  • After installing the APK you should be greeted with a similar screen the one below. The only difference between my screenshot and yours will be that you haven’t installed Magisk yet.

firasshaari@MacBook-Pro-9 ~ % adb push init_boot.img /sdcard/Download/
  • Open Magisk on the device, click on the “Ramdisk” install and “Select and Patch a File” and select the “init_boot.img” file that we pushed to the device in the last step.

  • Using the adb pull command, pull the generated patched “init_boot.img” file from your phone to your laptop.
firasshaari@MacBook-Pro-9 ~ % adb pull /sdcard/Download/magisk_patched-27000_Y3vcR.img
  • Now reboot the device in the bootloader mode and flash the patched image.

firasshaari@MacBook-Pro-9 ~ % adb reboot bootloader
firasshaari@MacBook-Pro-9 ~ % fastboot flash init_boot magisk_patched-27000_Y3vcR.img
  • Reboot the device and if all goes well Magisk should be installed and, at this point and you should have root access on the device. It can be seen in the example below how running iw commands fails at first but after acquiring root privileges using the su command the command is executed successfully.

firasshaari@MacBook-Pro-9 ~ % adb shell
OP595DL1:/ $ iw wlan info 
/system/bin/sh: iw: inaccessible or not found
127|OP595DL1:/ $ su
1|OP595DL1:/ # iw wlan0 info                                                                                                                                                                                                                                               
Interface wlan0
	ifindex 24
	wdev 0x1
	addr 8e:f1:ad:a1:a6:71
	ssid home
	type managed
	wiphy 0
	channel 36 (5180 MHz), width: 80 MHz, center1: 5210 MHz
	txpower 20.00 dBm
OP595DL1:/ # 
  • To turn the OnePlus 12 into sniffer mode, execute the following commands on adb shell.
iw phy phy0 interface add mon0 type monitor 
ip link set wlan0 down 
ip link set mon0 up 
ip link set wlan0 down
iw dev mon0 set channel 36 
tcpdump -i mon0 -envvv 

Useful Links

OFDM vs OFDMA

OFDM vs OFDMA

The 4th video in the series of the 802.11ax training videos. In this video I explain the difference between OFDM and OFDMA and introduce the concept of RUs in the 802.11ax standard


1 2