Which unfortunately usually puts you in a place where you have to specify the correct kit for the job.In the MikroTik world, roaming is still "up to the client to do" and this leads to all kinds of problems, especially when you are trying to carpet an area with WiFi coverage.
Lol, 802.11ax is on the way, and Mk still has this buggy non-certified mess instead 802.11ac. They don’t even think about ros 7, I won’t even surprise if company is in bad financial situation due to lost EU contracts....I hope in new ROSv7 have a lot of improvements, optimization and other protocol aviability in wireless part ! The Roaming works well, but only for reconnecting to device with strongest signal like 802.11k !
RouterOS 7 Beta is available for download: viewforum.php?f=1They don’t even think about ros 7,
In the whole world with every AP vendor and every client device, roaming is ALWAYS "up to the client".In the MikroTik world, roaming is still "up to the client to do"
No, with the more expensive systems that do "seamless roaming" it is the AP/controller that decides where the client is served.In the whole world with every AP vendor and every client device, roaming is ALWAYS "up to the client".In the MikroTik world, roaming is still "up to the client to do"
What you are referring to here is technically not a roaming, because in this case clients do not really roam, but are rather constantly talking to a single huge AP with spatially distributed radio elements. This approach clearly has advantages, but those come at a cost.No, with the more expensive systems that do "seamless roaming" it is the AP/controller that decides where the client is served.
Yes, it is clear to me that it operates at layer 1 instead of layer 2 and that it means that all your APs are mostly sharing the same radio bandwidth.What you are referring to here is technically not a roaming, because in this case clients do not really roam, but are rather constantly talking to a single huge AP with spatially distributed radio elements. This approach clearly has advantages, but those come at a cost.
... most programs and drivers are made in-house.
Firstly, I'd rather mikrotik concentrate on what they do really well with the hardware and software on the routerboards rather than try and "open up" the platform. I don't think it needs it and it would just create a support headache for them. If you want an OpenWRT box then buy one and not a mikrotik router.I think this is what makes more and more members of this forum lament on. Regarding bugs and missing features.
Mikrotik decided to use OpenSource for the bootloader and the kernel at least (NTP? OpenVPN?). But most drivers and protocols are obviously developed in house. While other vendors use hardware manufacture's drivers and/or OpenSource software. This later aproach has a much bigger number of users, testers and developers behind it. So bugs could be find quicker and new features developed faster. Mikrotik seems to be lagging behind, e.g. 802.11v/k/r, Let's Encrypt, ... you name it.
If you just want to sell more hardware, maybe open up the bootloader and (actively) support installing OpenWRT (and the like) on your RouterBoards.
I believe you are referring to Single Channel Architecture from what was called 'Meru' now Fortinet. That is a whole new ball game and is not controlling roaming between APs. The difference with SCA is that there is NO roaming on the part of the client as there is only one BSSID and therefore with only one BSSID the client has no need to roam as they believe they are always connected to the same device. Fortinet SCA also introduced virtual cells, where they allow multiple BSSIDs on multiple channels, in which case even with this system, the client decides when to roam between virtual cells. Not the AP or the controller, the client.No, with the more expensive systems that do "seamless roaming" it is the AP/controller that decides where the client is served.
Of course that system also has some disadvantages and also the systems in the price segment where MikroTik operates do not offer this (AFAIK).
Shame that sales departments sell products not engineers.WOW! Sounds like a lot of folks are stuck in Wifi 4 (Wifi 6 was just announced by WFA this Monday)!
Wifi can do roaming, seamlessly with the phones which are in the market since 2-3 years!
Its offered by couple of retail MESH solutions which work well, and is becoming part of EasyMesh
standardization to be able to use CAP from one vendor and an extender form another one (at least that is the theory).
You are right, an old printer or 11bgn IOT device will not roam and also some chaps with old phones. But you don;t care as they don't need to move really.Shame that sales departments sell products not engineers.WOW! Sounds like a lot of folks are stuck in Wifi 4 (Wifi 6 was just announced by WFA this Monday)!
Wifi can do roaming, seamlessly with the phones which are in the market since 2-3 years!
Its offered by couple of retail MESH solutions which work well, and is becoming part of EasyMesh
standardization to be able to use CAP from one vendor and an extender form another one (at least that is the theory).
The client devices make the decision to roam on every meshed network product, not the AP, regardless of what the marketing guys want you to believe. The only decision an AP, or a Meshed set of APs can ever do is inform the client with data about the environment that the client may not have been able to determine for itself. E.g. how many clients are connected to an AP, how occupied an AP is, what other APs there are nearby and all of that data can then be passed to the client via additional standards such as 802.11k/r/v. Once the client has received that data, IT then decides where to roam to.
To put it another way, the AP can suggest ideas to the connected device, inform the client about what the best thing is to do. But if the client wants to act stupid and do something different, that's up the client device. The AP cannot force it where to roam to. Regardless of the clever wording used by their marketing department to suggest or claim otherwise.
If you've capsman setup correctly then devices should roam seamlessly between AP's. That's my, and others, experience of it. If devices aren't roaming properly then it's worth trying a survey of the area and looking at power levels on your AP's along with access lists.My point is, I like to have ROS, the swiss knife for Wireless which can do all Wifi applications with one device and one SW.
But we come to a point where I want more performance and functions for indoor use cases, and I will never us an RB4011 for instance as an outdoor PtP device.
Instead of that I would like to have some additional things that would allow to optimise further indoor networks on devices such as RB4011.
In the absence of that, I do use tuned Wifi access lists, but its pretty much a set up per each device, per location to be assigned to one or another. This does not scale at all and needs a lot of testing to work.
There are several manufacturers who offer this option. The key point is the use of a single BSSID across APs, making the client move from one AP to the other without any participation and without it even knowing about it. Thus it also cannot go wrong based on client behavior or limitations (like not supporting newer protocols).I believe you are referring to Single Channel Architecture from what was called 'Meru' now Fortinet. That is a whole new ball game and is not controlling roaming between APs. The difference with SCA is that there is NO roaming on the part of the client as there is only one BSSID and therefore with only one BSSID the client has no need to roam as they believe they are always connected to the same device. Fortinet SCA also introduced virtual cells, where they allow multiple BSSIDs on multiple channels, in which case even with this system, the client decides when to roam between virtual cells. Not the AP or the controller, the client.No, with the more expensive systems that do "seamless roaming" it is the AP/controller that decides where the client is served.
Of course that system also has some disadvantages and also the systems in the price segment where MikroTik operates do not offer this (AFAIK).
/caps-man access-list
add action=accept interface=any signal-range=-87..120
add action=reject interface=any signal-range=-120..-88
Yeah, but as was written before this can also backfire on you, especially when you have no complete coverage of the entire building.
We had another installation where there was some feature configured to auto-add every device to a blacklist for 1 minute every 4 hours, to force everyone to roam should they have moved after initial connection.
As there was only coverage from 1 AP in certain spots, this effectively kicked off everyone in those spots in the middle of the working day.
Not a big issue when the network is only used for browsing, but in our case there were RDP and Citrix sessions that were interrupted etc.
Well, I'm just telling my feeling after comparing to the cheapest TP-Link mesh kit with k/v/r supported system, it makes my hAP AC2 + cAP AC looks like an idiot. Maximum download speed, roaming performance, handling multi clients, stability, all lost.Works fine, admin is the problem
Agree, Tplink EAP + OC control don't require alot config like capsman, just plug n play.Well, I'm just telling my feeling after comparing to the cheapest TP-Link mesh kit with k/v/r supported system, it makes my hAP AC2 + cAP AC looks like an idiot. Maximum download speed, roaming performance, handling multi clients, stability, all lost.Works fine, admin is the problem
A person here said MikroTik don't use chipset stock driver due to better maintenance and no need to ask for mercy if any problem from the driver, end up we are now asking for mercy for MikroTik to add those highly demanded features like k/v/r and band steering.
If you only use MikroTik solution, you see no problem, until you try another solution from other vendor, you will know what we are talking about.
One man complaint, maybe mistake; many complaints, must be a reason.
True, I did make sure I have about -70dBm for both APs in the handover area, by the time i wrote this post MT had a hard time to handover my client and eventually dropped connection after 10 pings, but with recent firmware it seems getting better as it will handover better and no crazy ping drop like before, and the log file is now showing "registered to other device in network" just like CAPsMAN do, it was used to be like "disconnected, extensive data loss", I think MT has done some fixes on handover, good job MT!Hello,
Seamless roaming is mostly related to network design like: proper Tx power level, proper frequency and channel width, activated datarates, activated chains, activated technologies and adjusted rest parameters available on MT ROS. Also distance between CAPs should be adjusted. Interference from outside - other WiFis and non WiFi interference should be considered.
WiFi seamless roaming itself requires a huge level of expertise. At least CWNA level.
Technologies like 802.11k can speed up roaming for fast moving client.
802.11v -can help select less congested AP (if available near).
802.11r- can help speed up roaming if you are using EAP authentication.
With proper RF design and settings on MT Capsman -> all MT wireless hardware (which supports b/g/n/ or a/n/ac) I tested can do seamless Roaming for voice and video like skype, viber, whatsup, etc. No ping losses etc.
No feel of call or moving picture disruption. In case CAPs are positioned with more than -70dBm distance between each other (Tx power for CAPs should not exceed clients Tx power level) than some video disruptions may be noticed, but not voice.
In case you start high data throughput tests between client and AP - the seamless roaming can become problematic, as there becomes less time for the client to scan for other APs to roam to.
Of course It would be nice if MT team additionally implements (at least experimental 802.11k) with enable/disable option per SSID for mobile clients(which support it) to do less channel scanning during movement from one AP to another.
It helps. But as you agreed and stated, the client makes the decision. Fortinet’s controller can instruct an AP to stop communicating with a client to encourage the client to be forced to roam elsewhere. However it cannot tell the client which AP to roam to. It can effectively provide suggestions only. The controller may hear the client best on a specific AP or may know how many clients are currently connected to all APs and decide which is best for the client. But that’s not the view of the world from the clients perspective. It may hear a totally different AP which is further away better. Therefore will roam to that one instead. Also some client device vendors code take a very aggressive attitude to APs that stop communicating or constantly kick clients off their AP by blacklisting that AP for lengthy periods of time so when the AP wishes that client to roam back, the client say no.https://help.fortinet.com/fos60hlp/60/C ... %20roaming : "the wireless controller selects the least busy access point that is closest to the new client and this access point is the one that responds to the client and the one that the client joins".
Yes, but if the house is big you'll need more than an only AP anyway (brand is not so important, maximum legal power limit is for all).Hi there i have mikrotik hap ac and move to a bigger house wifi just suck I waill add tp link m4 to mikrotk and use mikrotik to be a router with vpn and tp link m4 is dealing with all the wifi. did you have this setup? What can you tell me about it? did you set your tp link as AP and mikrotik as router right?
20:26:36 caps,info AC:C1:EE:44:B2:CB@main51 disconnected, registered to other interface
20:26:46 caps,info AC:C1:EE:44:B2:CB@main51 connected, signal strength -82
20:26:46 caps,info AC:C1:EE:44:B2:CB@kit51 disconnected, registered to other interface
20:26:47 caps,info AC:C1:EE:44:B2:CB@kit51 connected, signal strength -59
20:26:47 caps,info AC:C1:EE:44:B2:CB@main51 disconnected, registered to other interface
20:26:57 caps,info AC:C1:EE:44:B2:CB@main51 connected, signal strength -81
20:26:57 caps,info AC:C1:EE:44:B2:CB@kit51 disconnected, registered to other interface
20:27:04 caps,info AC:C1:EE:44:B2:CB@kit51 connected, signal strength -59
20:27:05 caps,info AC:C1:EE:44:B2:CB@main51 disconnected, registered to other interface
20:27:13 caps,info AC:C1:EE:44:B2:CB@main51 connected, signal strength -80
20:27:13 caps,info AC:C1:EE:44:B2:CB@kit51 disconnected, registered to other interface
20:27:20 caps,info AC:C1:EE:44:B2:CB@kit51 connected, signal strength -58
20:27:21 caps,info AC:C1:EE:44:B2:CB@main51 disconnected, registered to other interface
20:27:28 caps,info AC:C1:EE:44:B2:CB@main51 connected, signal strength -80
20:27:28 caps,info AC:C1:EE:44:B2:CB@kit51 disconnected, registered to other interface
20:27:35 caps,info AC:C1:EE:44:B2:CB@kit51 connected, signal strength -56
20:27:35 caps,info AC:C1:EE:44:B2:CB@main51 disconnected, registered to other interface
20:27:48 caps,info AC:C1:EE:44:B2:CB@main51 connected, signal strength -80
20:27:48 caps,info AC:C1:EE:44:B2:CB@kit51 disconnected, registered to other interface
20:27:55 caps,info AC:C1:EE:44:B2:CB@kit51 connected, signal strength -55
20:27:56 caps,info AC:C1:EE:44:B2:CB@main51 disconnected, registered to other interface
20:28:05 caps,info AC:C1:EE:44:B2:CB@main51 connected, signal strength -81
20:36:11 caps,info AC:C1:EE:44:B2:CB@main51 rejected, forbidden by access-list
20:36:14 caps,info AC:C1:EE:44:B2:CB@kit51 reassociating
20:36:14 caps,info AC:C1:EE:44:B2:CB@kit51 connected, signal strength -39
20:36:14 dhcp,info dhcp1 deassigned 258.472.4.17 from AC:C1:EE:44:B2:CB
20:36:14 dhcp,info dhcp1 assigned 258.472.4.17 to AC:C1:EE:44:B2:CB
....repeat 4-5 times
20:39:03 caps,info AC:C1:EE:44:B2:CB@main51 rejected, forbidden by access-list
20:39:08 caps,info AC:C1:EE:44:B2:CB@kit51 reassociating
20:39:08 caps,info AC:C1:EE:44:B2:CB@kit51 connected, signal strength -38
20:39:08 dhcp,info dhcp1 deassigned 258.472.4.17 from AC:C1:EE:44:B2:CB
20:39:08 dhcp,info dhcp1 assigned 258.472.4.17 to AC:C1:EE:44:B2:CB
Really?Mikrotik does support IEEE 802.11r-2008, fast Roaming, since 6.35 or something...
Thats what a good source has told me... Am i wrong?Really?Mikrotik does support IEEE 802.11r-2008, fast Roaming, since 6.35 or something...
Yes, you are.Thats what a good source has told me... Am i wrong?
That has nothing to do with 802.11r. That was just the initial implementation of the ordinary roaming for mode=station. Before that change Mikrotik wireless clients never attempted to roam until signal is lost.Release 6.35
wireless-rep - initial support for station roaming for station mode in 802.11 protocol;
No, it didn’t help. Maybe a little better.I noticed today that this happens when the phone tries to enter sleep mode. And it droppin RX/TX rates.... MB there is a way to forbid low rates?
UPD. And look like it helps.
It happends in 1-3 meters from AP. It ALWAYS happend with low rates, when phone is trying to sleep. And it usually happend at night.And to be boring again: a stronger AP signal does not help much. Wifi is bidirectional, if the AP cannot receive the device, there is no communication possible.https://metis.fi/en/2017/10/txpower/
caps-man access-list print detail
Flags: X - disabled
0 ;;; must be on psanter2g! rejects the tv connecting there
mac-address=B4:82:FE:93:0A:32 interface=2g-psanter-1 signal-range=-120..120 allow-signal-out-of-range=10s ssid-regexp="" time=0s-1d,sun,mon,tue,wed,thu,fri,sat action=reject
1 ;;; reject bad 5g (salon)
interface=5g-salon-1 signal-range=-120..-75 allow-signal-out-of-range=10s ssid-regexp="" time=0s-1d,sun,mon,tue,wed,thu,fri,sat action=reject
2 ;;; reject bad 5g (psanter)
interface=5g-psanter-1 signal-range=-120..-75 allow-signal-out-of-range=10s ssid-regexp="" time=0s-1d,sun,mon,tue,wed,thu,fri,sat action=reject
3 ;;; reject bad 5g (mamad)
interface=5g-r-mamad-1 signal-range=-120..-75 allow-signal-out-of-range=10s ssid-regexp="" time=0s-1d,sun,mon,tue,wed,thu,fri,sat action=reject
4 ;;; good 5g (salon)
interface=5g-salon-1 signal-range=-78..120 allow-signal-out-of-range=15s ssid-regexp="" time=0s-1d,sun,mon,tue,wed,thu,fri,sat action=accept
5 ;;; good 5g (psanter)
interface=5g-psanter-1 signal-range=-78..120 allow-signal-out-of-range=15s ssid-regexp="" time=0s-1d,sun,mon,tue,wed,thu,fri,sat action=accept
6 ;;; good 5g (mamad)
interface=5g-r-mamad-1 signal-range=-78..120 allow-signal-out-of-range=10s ssid-regexp="" time=0s-1d,sun,mon,tue,wed,thu,fri,sat action=accept
7 ;;; avoid bad salon 2g
interface=2g-salon-1 signal-range=-120..-80 allow-signal-out-of-range=10s ssid-regexp="" time=0s-1d,sun,mon,tue,wed,thu,fri,sat action=reject
8 ;;; avoid bad mamad 2g
interface=2g-r-mamad-1 signal-range=-120..-75 allow-signal-out-of-range=10s ssid-regexp="" time=0s-1d,sun,mon,tue,wed,thu,fri,sat action=reject
9 ;;; bad 2g (salon)
interface=2g-salon-1 signal-range=-120..-70 allow-signal-out-of-range=3s ssid-regexp="" time=0s-1d,sun,mon,tue,wed,thu,fri,sat action=accept
10 ;;; bad 2g (psanter)
interface=2g-psanter-1 signal-range=-120..-70 allow-signal-out-of-range=3s ssid-regexp="" time=0s-1d,sun,mon,tue,wed,thu,fri,sat action=accept
11 ;;; mediocre 2g (salon)
interface=2g-salon-1 signal-range=-70..-55 allow-signal-out-of-range=3s ssid-regexp="" time=0s-1d,sun,mon,tue,wed,thu,fri,sat action=accept
12 ;;; mediocre 2g (psanter)
interface=2g-psanter-1 signal-range=-70..-55 allow-signal-out-of-range=3s ssid-regexp="" time=0s-1d,sun,mon,tue,wed,thu,fri,sat action=accept
13 ;;; mediocre mamad 2g
interface=2g-r-mamad-1 signal-range=-60..-55 allow-signal-out-of-range=10s ssid-regexp="" time=0s-1d,sun,mon,tue,wed,thu,fri,sat action=accept
14 ;;; good 2g (salon)
interface=2g-salon-1 signal-range=-55..120 allow-signal-out-of-range=3s ssid-regexp="" time=0s-1d,sun,mon,tue,wed,thu,fri,sat action=accept
15 ;;; good 2g psanter
interface=2g-psanter-1 signal-range=-55..120 allow-signal-out-of-range=3s ssid-regexp="" time=0s-1d,sun,mon,tue,wed,thu,fri,sat action=accept
caps-man access-list print detail
Flags: X - disabled
0 mac-address=B4:82:FE:93:0A:32 interface=2g-salon-1 signal-range=-120..120 allow-signal-out-of-range=10s ssid-regexp="" time=0s-1d,sun,mon,tue,wed,thu,fri,sat action=reject
1 ;;; reject bad 5g
interface=*50 signal-range=-120..-75 allow-signal-out-of-range=10s ssid-regexp="" time=0s-1d,sun,mon,tue,wed,thu,fri,sat action=reject
2 ;;; reject bad 5g
interface=*3A signal-range=-120..-75 allow-signal-out-of-range=10s ssid-regexp="" time=0s-1d,sun,mon,tue,wed,thu,fri,sat action=reject
3 ;;; reject bad 5g
interface=*3D signal-range=-120..-75 allow-signal-out-of-range=10s ssid-regexp="" time=0s-1d,sun,mon,tue,wed,thu,fri,sat action=reject
4 ;;; good 5g
interface=*3A signal-range=-78..120 allow-signal-out-of-range=15s ssid-regexp="" time=0s-1d,sun,mon,tue,wed,thu,fri,sat action=accept
5 ;;; good 5g
interface=*3D signal-range=-78..120 allow-signal-out-of-range=15s ssid-regexp="" time=0s-1d,sun,mon,tue,wed,thu,fri,sat action=accept
6 ;;; good 5g
interface=*50 signal-range=-78..120 allow-signal-out-of-range=10s ssid-regexp="" time=0s-1d,sun,mon,tue,wed,thu,fri,sat action=accept
7 ;;; avoid bad salon 2g
interface=*39 signal-range=-120..-80 allow-signal-out-of-range=10s ssid-regexp="" time=0s-1d,sun,mon,tue,wed,thu,fri,sat action=reject
8 ;;; avoid bad mamad 2g
interface=*4F signal-range=-120..-75 allow-signal-out-of-range=10s ssid-regexp="" time=0s-1d,sun,mon,tue,wed,thu,fri,sat action=reject
9 ;;; bad 2g
interface=*3C signal-range=-120..-70 allow-signal-out-of-range=3s ssid-regexp="" time=0s-1d,sun,mon,tue,wed,thu,fri,sat action=accept
10 ;;; bad 2g
interface=*39 signal-range=-120..-70 allow-signal-out-of-range=3s ssid-regexp="" time=0s-1d,sun,mon,tue,wed,thu,fri,sat action=accept
11 ;;; mediocre 2g
interface=*39 signal-range=-70..-55 allow-signal-out-of-range=3s ssid-regexp="" time=0s-1d,sun,mon,tue,wed,thu,fri,sat action=accept
12 ;;; mediocre 2g
interface=*3C signal-range=-70..-55 allow-signal-out-of-range=3s ssid-regexp="" time=0s-1d,sun,mon,tue,wed,thu,fri,sat action=accept
13 ;;; mediocre mamad 2g
interface=*4F signal-range=-60..-55 allow-signal-out-of-range=10s ssid-regexp="" time=0s-1d,sun,mon,tue,wed,thu,fri,sat action=accept
14 ;;; good 2g
interface=*39 signal-range=-55..120 allow-signal-out-of-range=3s ssid-regexp="" time=0s-1d,sun,mon,tue,wed,thu,fri,sat action=accept
15 ;;; good 2g
interface=*3C signal-range=-55..120 allow-signal-out-of-range=3s ssid-regexp="" time=0s-1d,sun,mon,tue,wed,thu,fri,sat action=accept
Maybe this is true for other vendors/cases, but with Mikrotik, it's reportedly the main way to adjust the roaming behavior, both officially documented and advised by the users.Hello
Access lists are only useful for cheap or old sticky clients.
For rest is will make thing worse if you do not know how wifi works or there are special cases for using access lists but they are not for roaming...
Try CWNA - 107 for the beginning, ( or hire CWNP engineer) otherwise wifi will not do seamless roaming on any vendor.
Regards.
https://wiki.mikrotik.com/wiki/Manual:CAPsMAN_tipsIt is not officially documented to use access lists by mikrotik for seamless roaming. Please share the link if any.
The best advice will be to follow CWNA, CWDP practices.
Look dude, I was network owner and admin for 14 years. Over that time I saw MIkrotik deveplment from the begining. Recently I must admit that You personaly, maybe other Mikrotik stuff, are very rude. People are giving reasonable problems to solve and You answers are ignorant or simply rude!Please take your trolling nonsense elsewhere.