Wi-Fi Activity in Open Environments: Tools, Measurements, and Analyses. Thomas Claveirole Ph.D. Defense February 26, 2010
|
|
- Gervase Eaton
- 6 years ago
- Views:
Transcription
1 Wi-Fi Activity in Open Environments: Tools, Measurements, and Analyses Thomas Claveirole Ph.D. Defense February 26, 2010 Ana Cavalli Reviewer Prof. TÉLÉCOM & Management SudParis Thierry Turletti Reviewer INRIA Sophia Antipolis Khaldoun Al Agha Examiner Prof. Université Paris-Sud 11 Guillaume Chelius Examiner INRIA / ENS Lyon Marcelo Dias de Amorim Co-director CNRS / Université Pierre et Marie Curie Serge Fdida Co-director Prof. Université Pierre et Marie Curie
2 Wi-Fi networking Proliferation of Wi-Fi capable devices Laptop, PDAs But also... 2
3 Wi-Fi networking Proliferation of Wi-Fi capable devices Laptop, PDAs Cell phones, portable audio players, handheld game consoles Almost any electronic device (e.g., digital cameras, webcams, alarm clocks) 3 Wi-Fi / IEEE everywhere!
4 Motivations Study new Wi-Fi usages Investigate Better understanding of Wi-Fi in the wild Insight 4 new Wi-Fi enabled environments for improving protocols/applications
5 Existing techniques: intrusive measurements Access point logs / SNMP data (e.g., Kim et al., Infocom 2006) Wired backbone tapping (e.g., Henderson et al., MobiCom 2004) 5
6 Existing techniques: intrusive measurements Access point logs / SNMP data (e.g., Kim et al., Infocom 2006) Wired backbone tapping (e.g., Henderson et al., MobiCom 2004) Focus on a single network Need to access the infrastructure Impractical in many places 6
7 Existing techniques: Wi-Fi sniffing Sniffers Listen spread over an area to all surrounding networks AP1 AP1 SS AP2 AP2 7
8 Existing techniques: Wi-Fi sniffing Sniffers Listen Used spread over an area to all surrounding networks for Protocol analysis (e.g., Romdhanne et al., ROADS 2009, Mahajan et al., SIGCOMM 2006) AP1 AP1 SS Problem diagnosis (e.g., Cheng et al., SIGCOMM 2007) Security (e.g., Bahl et al., MobiSys 2006) 8 AP2 AP2
9 Wi-Fi sniffing Features Entirely passive AP1 AP1 AP2 AP2 Non-intrusive Network equipment Network operation No S1 S1 AP3 AP3 infrastructure needed S2 S2 S3 S3 9
10 Outline Wi-Fi sniffing: issues Contribution 1 Tools for Wi-Fi sniffing: WiPal Contribution 2 Study of Wi-Fi sniffing accuracy Contribution 3 Study of Wi-Fi activity in 3 environments 10
11 Wi-Fi sniffing: issues 11
12 Issue 1 Sniffing accuracy PP11 SS AP AP PP11 PP11 Ideally: AP sends P1 to user S hears P1 User receives P1 12
13 Issue 1 Sniffing accuracy?? SS AP AP PP22 PP22 In practice: AP sends P2 to user S misses P2 User receives P2 13
14 Issue 1 Sniffing accuracy?? SS AP AP PP33?? In practice: AP sends P3 to user S misses P3 User misses P3 14
15 Issue 1 Sniffing accuracy PP44 SS AP AP PP44?? In practice: AP sends P4 to user S hears P4 User misses P4 15
16 Issue 1 Sniffing accuracy PP55 SS AP AP?? PP55 In practice: User sends P5 to AP S hears P5 AP misses P5 16
17 Issue 1 Sniffing accuracy SS AP AP PP11 PP11 PP22 PP11 PP22 PP33 PP44 PP44 PP55 17 PP55
18 Issue 2 Trace merging Goal: only one trace Global vision of all network traffic Temper frame losses for individual sniffers 18
19 Issue 2 Trace merging Complex process Accurate synchronization Identify duplicates 19
20 Contribution 1 Tools for Wi-Fi sniffing: WiPal WiPal: Efficient Offline Merging of IEEE Traces Mobile Computing and Communications Review, 2010 WiPal and WScout: Two Hands-on Tools for Wireless Packet Traces Manipulations and Visualization (demo) ACM Mobicom Workshop on Wireless Networks Testbeds (WiNTECH), 2008 Manipulating Wi-Fi Packet Traces with WiPal: Design and Experience Submitted to Software: Practice and Experience,
21 WiPal Overview C++ library and programs to Manipulate Wi-Fi packet traces Develop new packet processing programs 21
22 WiPal Overview C++ library and programs to Manipulate Wi-Fi packet traces Develop new packet processing programs Includes Hi-level features, e.g., statistics extraction, anonymization, trace merging Low-level features, e.g., frame parsing, trace I/O An original design and innovative features 22
23 Trace merging Overview T1 T2 1. Reference frames appear in both traces Reference frames 23
24 Trace merging Overview T1 T2 T1 T2 1. Reference frames appear in both traces 2. They enable traces synchronization Reference frames 24 Synchro.
25 Trace merging Overview T1 T2 T1 T2 Output 1. Reference frames appear in both traces 2. They enable traces synchronization 3. Compare timestamps to merge Reference frames 25 Synchro. Merging
26 WiPal Trace synchronization Synchronization function: map T1's clock to T2's T2's clock T1's clock Reference frames 26
27 WiPal Trace synchronization Synchronization function: map T1's clock to T2's T2's clock T1's clock Reference frames 27
28 WiPal Trace synchronization Synchronization function: map T1's clock to T2's T2's clock? T1's clock Reference frames 28
29 WiPal Trace synchronization Synchronization function: map T1's clock to T2's T2's clock Work T1's clock Synchronization window or 29 Reference frames on sliding windows of reference frames
30 WiPal Trace synchronization Synchronization T2's clock function: map T1's clock to T2's Ref. frames window Work T1's clock or 30 Reference frames on sliding windows of reference frames
31 WiPal Trace synchronization Synchronization function: map T1's clock to T2's T2's clock Work T1's clock on sliding windows of reference frames Use or 31 Reference frames linear regressions
32 WiPal Trace synchronization Synchronization function: map T1's clock to T2's T2's clock Work T1's clock on sliding windows of reference frames Use or 32 Reference frames linear regressions
33 WiPal Trace synchronization Synchronization function: map T1's clock to T2's T2's clock Work T1's clock on sliding windows of reference frames Use or 33 Reference frames linear regressions
34 WiPal Evaluation 2 criteria Correctness Synchronization accuracy 34
35 WiPal Evaluation 2 criteria Correctness Synchronization accuracy 4 datasets, 4 traces each (17.5 GB total) Different sniffing conditions Environment Hardware Channel 8 35 merge operations
36 WiPal Evaluation Correctness (1/2) Some Real tests using synthetic traces traces: hard to check (no ground-truth) Inconsistencies when merging real traces Look for duplicate data / beacons / probe resp. 1 anomaly (implies at most 4 frames out of 79,000,000) 36
37 WiPal Evaluation Correctness (2/2) 37
38 WiPal Evaluation Correctness (2/2) Linear interpolation Incorrect Larger window sizes Incorrect Best values:
39 WiPal Evaluation Synchronization Linear interpolation worst results Larger window sizes lack precision WiPal Windows of 4 39
40 WiPal Conclusion WiPal packet traces processing framework Designed An for speed and user-friendliness original merging tool More correct than other tools More accurate than other tools 40
41 Contribution 2 Study of sniffing accuracy On the Completeness of Wireless Packet Sniffing Conditional acceptance to IEEE Communications Letters,
42 Accuracy Evaluating completeness Wi-Fi defines valid frame sequences Assume conform implementations Invalid sequence missing frame Detect invalid sequences, infer missing frames 42
43 Accuracy Evaluating completeness Wi-Fi defines valid frame sequences Assume conform implementations Invalid sequence missing frame Detect invalid sequences, infer missing frames Evaluation 43 techniques: 2 categories Frame types data data ack. ack. data? data? ack. ack.
44 Accuracy Evaluating completeness Wi-Fi defines valid frame sequences Assume conform implementations Invalid sequence missing frame Detect invalid sequences, infer missing frames Evaluation 44 techniques: 2 categories Frame types Seq. numbers data data n 42 n 42 ack. ack. n 43? n 43? data? data? ack. ack. n 44? n 44? n 45 n 45
45 Accuracy Experiment setups Experiment 1: sniffers All sniffers on a single desktop Duration 1h Experiment 2: sniffers All sniffers in the same room (grouped by 2) Duration 2h 45
46 Accuracy Evaluation issues Wrong assumption: missing frame sniffer loss 46
47 Accuracy Evaluation issues Wrong assumption: missing frame sniffer loss Wrong assumption: Wi-Fi compliance Sequence numbers often incorrect *: at least one device 5% bias 47
48 Accuracy Evaluation issues Wrong assumption: missing frame sniffer loss Wrong assumption: Wi-Fi compliance Sequence numbers often incorrect *: at least one device 5% bias Frame-type, limitation: PP11 cannot detect loss bursts data? data? ack.? ack.? sigcomm2004: >59% of missing frames *: >80% 48 P P22
49 Accuracy Using multiple sniffers Extract subsets with 1, 2,, N sniffers Compare For subsets each subset of size n, study New frames compared to n = n - 1 Missing frames compared to n = N 49
50 Accuracy Results Most frames shared among sniffers But all sniffers have original frames! High variability Legend Legend Box size: number of frames Red part: original frames 50
51 Accuracy Conclusion Completeness evaluation Frame-type techniques: unreliable Seq. number techniques: need caution Using multiple sniffers Frame loss unavoidable High variability / randomness 51
52 Contribution 3 Study of Wi-Fi activity in 3 environments An Empirical Analysis of Wi-Fi Activity in Three Urban Scenarios PerCom Workshop on Pervasive Wireless Networking (PWN), 2009 Sniffing IEEE Mobility AdHoc-NOW PhD Workshop,
53 Wi-Fi activity Trace collection Office building 3 days Sparse residential area 3 days Dense residential area 10 days High car/pedestrian traffic 53
54 Wi-Fi activity Device discovery 54
55 Wi-Fi activity Device discovery Uneven 55 distribution among channels
56 Wi-Fi activity Device discovery Uneven distribution among channels Day-night 56 pattern
57 Wi-Fi activity Device discovery Uneven distribution among channels Day-night Constant 57 pattern rate during long periods
58 Wi-Fi activity Active durations 58
59 Wi-Fi activity Active durations Uneven distribution among channels 59
60 Wi-Fi activity Active durations Uneven distribution among channels Uneven distribution of durations 60
61 Wi-Fi activity Active durations Uneven distribution among channels Uneven distribution of durations Most devices nearly inactive 61
62 Wi-Fi activity Conclusion Wireless A traces in 3 distinct environments number of expected results Still, a few unexpected behaviors Device growth Few regular users Environment 62 matters!
63 Conclusion WiPal: software tools for packet processing Used by: UCLA, St. Andrews, Keio, UFRJ Study of Wi-Fi sniffing accuracy Issues with existing techniques Accuracy of using multiple sniffers Study of Wi-Fi activity in 3 environments Some unexpected behaviors Environment matters 63
64 Perspectives Extend WiPal Investigate Extend 64 completeness issues analyses of Wi-Fi usages
65 Support slides 65
66 Processing traces: issues Packet processing programs Not generic enough, or slow Examples Wireshark Efficient, understands many protocols Export a library Dedicated to visualization and statistics Scapy Understand many protocols Generic, designed as a Python library Slow, unpractical on large traces (>1GB) 66
67 WiPal Merging (simplified) T1 T2 Output Use a pair of pointers Advance in both traces simultaneously Identify duplicates with content arrival time (±106 μs) 67
68 WiPal Merging (simplified) T1 T2 Output a pair of pointers Advance in both traces simultaneously Use Identify duplicates with content arrival time (±106 μs) 68
69 WiPal Merging (simplified) T1 T2 Output Use a pair of pointers Advance in both traces simultaneously Identify duplicates with content arrival time (±106 μs) 69
70 WiPal Merging (simplified) T1 T2 Output Use a pair of pointers Advance in both traces simultaneously Identify content arrival time (±106 μs) 70 duplicates with
71 WiPal Merging (simplified) T1 T2 Output Use a pair of pointers Advance in both traces simultaneously Identify content arrival time (±106 μs) 71 duplicates with
72 WiPal evaluation Merging speed WiPal 35 minutes to merge all datasets Wit (another offline merger) Use a database backend 8h 20 minutes just to import the datasets 1 import using Wit = 14 merges using WiPal Other 72 software More assumptions unfair comparison
73 Accuracy Results 73
74 Wi-Fi activity Datasets Duration Size Data size Devices ESSIDs Access points Ad Hoc cells Ad Office 3d 10h GB 3.43 GB Residential, sparse Residential, dense 3d 12h 10d 15h 3.67 GB 1.61 GB 4.75 MB MB Hoc cells ill-configured devices Hidden SSIDs / ISPs some oddities Sparse trace bigger than dense trace 74
An Empirical Analysis of Wi-Fi Activity in Three Urban Scenarios
1 An Empirical Analysis of Wi-Fi Activity in Three Urban Scenarios Thomas Claveirole, Mathias Boc, and Marcelo Dias de Amorim Université Pierre et Marie Curie Paris 6 {claveiro,boc,amorim}@rp.lip6.fr Abstract
More informationPIE in the Sky : Online Passive Interference Estimation for Enterprise WLANs
WiNGS Labs PIE in the Sky : Online Passive Interference Estimation for Enterprise WLANs * Nokia Research Center, Palo Alto Shravan Rayanchu, Suman Banerjee University of Wisconsin-Madison Konstantina Papagiannaki
More informationThe Challenges of Measuring Wireless Networks. David Kotz Dartmouth College August 2005
The Challenges of Measuring Wireless Networks David Kotz Dartmouth College August 2005 Why measure? For better management Large WLANs need scalable management To manage you must monitor To monitor you
More informationONELAB and Beyond. Prof. Serge Fdida. University P&M Curie, Paris 6, France
ONELAB and Beyond Prof. Serge Fdida University P&M Curie, Paris 6, France http://www.lip6.fr/rp IST 2006 Brussels, December 2006 1 ONELAB Rationale & History Grounded on ENEXT (NoE) Identification of critical
More informationRAWDAD : A Wireless Data Archive for Researchers
RAWDAD : A Wireless Data Archive for Researchers Jihwang Yeo November 2007 Outline The Challenges of Measuring Wireless Network Dartmouth campus measurement Measurement Challenges Modeling CRAWDAD: A Wireless
More informationImproving the latency of Hand-offs using Sentinel based Architecture
Improving the latency of 802.11 Hand-offs using Sentinel based Architecture Lenin Ravindranath, Fredrick Prashanth, Leo Prasath, Praveen Durairaj, Arul Siromoney Department of Computer Science and Engineering,
More informationSniffing and processing wireless traffic Alessandro Redondi
Sniffing and processing wireless traffic Alessandro Redondi Sniffing Sniffing or eavesdropping is the process of secretly listening to the communication of others (even without their consent) For wireless
More informationTrace Selection for Improved WLAN Monitoring
Trace Selection for Improved WLAN Monitoring Matteo Sammarco UPMC Sorbonne Universités Paris, France matteo.sammarco@lip.fr Miguel Elias M. Campista Universidade Federal do Rio de Janeiro Rio de Janeiro,
More informationWireless and Mobile Networks 7-2
Wireless and Mobile Networks EECS3214 2018-03-26 7-1 Ch. 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected
More informationTrace Selection for Improved WLAN Monitoring
Trace Selection for Improved WLAN Monitoring Matteo Sammarco UPMC Sorbonne Universités Paris, France matteo.sammarco@lip.fr Miguel Elias M. Campista Universidade Federal do Rio de Janeiro Rio de Janeiro,
More informationAnnouncements: ECE/CS 372 introduction to computer networks. Assignment 4 due now. Chapter 7
ECE/CS 372 introduction to computer networks Announcements: Assignment 4 due now Chapter 7 Acknowledgement: slides drawn heavily from Kurose & Ross and Prof. Bechir Hamdaoui Chapter 7, slide 1 Wireless
More informationStudy and Implementation of IEEE Physical Layer Model in YANS (Future NS-3) Network Simulator
B E G I N N I N G 1 Study and Implementation of IEEE 802.11 Physical Layer Model in YANS (Future NS-3) Network Simulator Thesis of Master of Science Networked Computer Systems By Masood Khosroshahy Supervisors:
More informationWireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross
Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired
More informationCSC 4900 Computer Networks: Wireless Networks
CSC 4900 Computer Networks: Wireless Networks Professor Henry Carter Fall 2017 Last Time Mobile applications are taking off! What about current platforms is fueling this? How are an application s permission
More informationWireless Protocols. Training materials for wireless trainers
Wireless Protocols Training materials for wireless trainers Goals The goal of this lecture is to introduce: IEEE wireless protocols coverage 802.11 radio protocols terminology WiFi modes of operation details
More informationWireless software defined networks: 5G or beyond 4G
Wireless software defined networks: 5G or beyond 4G Dr. Yoram haddad Jerusalem College of Technology- Lev Academic center haddad@jct.ac.il cc.jct.ac.il/~haddad DST - CSIR - South Africa, March 2014 80
More informationGeneration of Realistic Interferences in the Omnet++ INET Framework Based on Real Traffic Measurements
Generation of Realistic 802.11 Interferences in the Omnet++ INET Framework Based on Real Traffic Measurements Juan-Carlos Maureira 1 and Diego Dujovne 2 and Olivier Dalle 1 1 INRIA, I3S, CNRS, Univ. Nice
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 Wireless Links, WiFi, Cellular Internet Access, and Mobility Slides derived from those available on the Web site of the book Computer Networking, by Kurose
More informationAutomating Cross-Layer Diagnosis of Enterprise Wireless Networks
Automating Cross-Layer Diagnosis of Enterprise 802.11 Wireless Networks Yu-Chung Cheng Department of Computer Science & Engineering University of California, San Diego 1 Diagnosing distributed systems
More informationTopic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach
Topic 2b Wireless MAC Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Ch. 7: Background: # wireless
More informationData Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti
Data Communication & Networks G22.2262-001 Session 5 - Main Theme Wireless Networks Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences
More informationLecture 17: Wireless Networking"
Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion
More informationECE 435 Network Engineering Lecture 8
ECE 435 Network Engineering Lecture 8 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 26 September 2016 HW#3 was posted Announcements note the warnings you were getting on toupper()
More informationLast Lecture: Data Link Layer
Last Lecture: Data Link Layer 1. Design goals and issues 2. (More on) Error Control and Detection 3. Multiple Access Control (MAC) 4. Ethernet, LAN Addresses and ARP 5. Hubs, Bridges, Switches 6. Wireless
More informationMeasurement-based Characterization of in a Hotspot Setting
Measurement-based Characterization of 82.11 in a Hotspot Setting Maya Rodrig Charles Reis Ratul Mahajan David Wetherall John Zahorjan University of Washington rodrig,creis,ratul,djw,zahorjan @cs.washington.edu
More informationAnnouncements: ECE/CS 372 introduction to computer networks. Assign 4 is due this Thursday Lab 4 is due next Tuesday Assignment 5 posted soon
ECE/CS 372 introduction to computer networks Lecture 14 Announcements: Assign 4 is due this Thursday Lab 4 is due next Tuesday Assignment 5 posted soon Credit for lecture slides to Professor Bechir Hamdaoui
More informationDia: AutoDirective Audio Capturing Through a Synchronized Smartphone Array
Dia: AutoDirective Audio Capturing Through a Synchronized Smartphone Array Sanjib Sur Teng Wei and Xinyu Zhang University of Wisconsin - Madison 1 Multimedia applications in smartphones Growing mobile
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. 6: Wireless and Mobile Networks 6
More informationCommon problems in production Wireless Networks. Jigsaw: Solving the Puzzle of Enterprise Analysis. Sounds Familiar?
Jigsaw: Solving the Puzzle of Enterprise 802.11 Analysis Written by Yu-Chung Cheng, John Bellardo, Peter Benko, Alex C. Snoeren, Geoffrey M. Voelker and Stefan Savage Analysis by Carlos Troncoso CS388
More informationWireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University
Wireless and WiFi Daniel Zappala CS 460 Computer Networking Brigham Young University Wireless Networks 2/28 mobile phone subscribers now outnumber wired phone subscribers similar trend likely with Internet
More informationNetwork Management April 2004
Network Management April 2004 The Four Pillars of Network Management Network Management The Four Pillars of Network Management The First Three Pillars Defined The Fourth Pillar Conclusions THE FIRST THREE
More informationAn In-depth Study of LTE: Effect of Network Protocol and Application Behavior on Performance
An In-depth Study of LTE: Effect of Network Protocol and Application Behavior on Performance Authors: Junxian Huang, Feng Qian, Yihua Guo, Yuanyuan Zhou, Qiang Xu, Z. Morley Mao, Subhabrata Sen, Oliver
More informationA Configuration Protocol for Embedded Devices on Secure Wireless Networks
A Configuration Protocol for Embedded Devices on Secure Wireless Networks Larry Sanders lsanders@ittc.ku.edu 6 May 2003 Introduction Wi-Fi Alliance Formally Wireless Ethernet Compatibility Alliance (WECA)
More informationCS 332 Computer Networks Wireless Networks
CS 332 Computer Networks Wireless Networks Professor Szajda Chapter 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets:
More informationCSNT 180 Wireless Networking. Chapter 7 WLAN Terminology and Technology
CSNT 180 Wireless Networking Chapter 7 WLAN Terminology and Technology Norman McEntire norman.mcentire@servin.com Founder, Servin Corporation, http://servin.com Technology Training for Technology Professionals
More informationThe Value of Cisco Compatible Extensions (CCX) for Mobile Computers
The Value of Cisco Compatible Extensions (CCX) for Mobile Computers Originally Published: October 2007 Updated: April 2010, October 2012 A White Paper from Laird Technologies IEEE and industry standards
More informationChapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network
Chapter 6 Wireless and Mobile Networks Computer Networking: Top Down pproach 5 th edition. Jim Kurose, Keith Ross ddison-wesley, pril 009. Chapter 6: Wireless and Mobile Networks ackground: # wireless
More informationPart I. Wireless Communication
1 Part I. Wireless Communication 1.5 Topologies of cellular and ad-hoc networks 2 Introduction Cellular telephony has forever changed the way people communicate with one another. Cellular networks enable
More informationChapter - 1 INTRODUCTION
Chapter - 1 INTRODUCTION Worldwide Interoperability for Microwave Access (WiMAX) is based on IEEE 802.16 standard. This standard specifies the air interface of fixed Broadband Wireless Access (BWA) system
More informationIntroduction Problems and Improvements RR DLP DisCarte Results. DisCarte. A Disjunctive Internet Cartographer. Sebastian Schlunke
DisCarte A Disjunctive Internet Cartographer Sebastian Schlunke Seminar Internet Measurement Technische Universität Berlin February 23, 2009 Based on: DisCarte: A Disjunctive Internet Cartographer by R.
More informationLink Estimation and Tree Routing
Network Embedded Systems Sensor Networks Link Estimation and Tree Routing 1 Marcus Chang, mchang@cs.jhu.edu Slides: Andreas Terzis Outline Link quality estimation Examples of link metrics Four-Bit Wireless
More informationChapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network.
Chapter 6 Wireless and obile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. Chapter 6: Wireless and obile Networks
More informationObserving Home Wireless Experience through WiFi APs
Observing Home Wireless Experience through WiFi APs Ashish Patro* Srinivas Govindan Prof. Suman Banerjee University of Wisconsin Madison *patro@cs.wisc.edu Dense residenfal WLANs today Apartment Building
More informationShared Access Networks Wireless. 1/27/14 CS mywireless 1
Shared Access Networks Wireless 1 Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected devices equals
More informationGuide to Wireless Communications, Third Edition. Objectives
Guide to Wireless Communications, Third Edition Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works
More informationCPSC 826 Internetworking. Wireless and Mobile Networks. Wireless Networks Wireless Hosts
1 CPSC 826 Intering Wireless and Mobile Networks Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu November 29, 200 Wireless and Mobile Networks Background Number
More informationCOMP 3331/9331: Computer Networks and Applications
COMP 3331/9331: Computer Networks and Applications Week 10 Wireless Networks Reading Guide: Chapter 6: 6.1 6.3 Wireless Networks + Security 1 Wireless and Mobile Networks Background: # wireless (mobile)
More informationPASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year
PASS4TEST IT Certification Guaranteed, The Easy Way! \ http://www.pass4test.com We offer free update service for one year Exam : 1T6-222 Title : Wireless LAN Analysis and Troubleshooting Vendors : Network
More informationCross-layer TCP Performance Analysis in IEEE Vehicular Environments
24 Telfor Journal, Vol. 6, No. 1, 214. Cross-layer TCP Performance Analysis in IEEE 82.11 Vehicular Environments Toni Janevski, Senior Member, IEEE, and Ivan Petrov 1 Abstract In this paper we provide
More informationMonitoring Testbed Experiments with MonEx
Monitoring Testbed Experiments with MonEx Abdulqawi Saif 1,2 Alexandre Merlin 1 Lucas Nussbaum 1 Ye-Qiong Song 1 1 Université de Lorraine, CNRS, Inria, LORIA, F-54000 Nancy, France 2 Qwant Entreprise,
More informationWireless# Guide to Wireless Communications. Objectives
Wireless# Guide to Wireless Communications Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works
More informationPRODUCT GUIDE Wireless Intrusion Prevention Systems
PRODUCT GUIDE Wireless Intrusion Prevention Systems The Need for Wireless INTRUSION PREVENTION SYSTEMS A Wireless Intrusion Prevention System (WIPS) is designed to address two classes of challenges facing
More informationSelf-Managing Wireless Networks
Self-Managing Wireless Networks Are self managing networks in our Future? Victor Bahl, Mircrosoft Corporation SIGCOMM MobiArch 2007, August 2007 Jinyoung, Han jyhan@mmlab.snu.ac.kr 2007. 11. 05 Contents
More information6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point
Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5
More informationWireless Attacks and Countermeasures
Wireless Attacks and Countermeasures Wireless Network Technology Wireless network refers to any type of computer network which is wireless, and is commonly associated with a network whose interconnections
More informationLightweight enhanced monitoring for high-speed networks
Lightweight enhanced monitoring for high-speed networks Rosa Vilardi, Dr. Luigi Alfredo Grieco, Prof. Gennaro Boggia Electrical and Information Engineering Department (DEI) Politecnico di Bari Italy Dr.
More informationAdvanced Network Troubleshooting Using Wireshark (Hands-on)
Advanced Network Troubleshooting Using Wireshark (Hands-on) Description This course is a continuation of the "Basic Network Troubleshooting Using Wireshark" course, and comes to provide the participants
More informationINTERNET TRAFFIC MEASUREMENT (PART II) Gaia Maselli
INTERNET TRAFFIC MEASUREMENT (PART II) Gaia Maselli maselli@di.uniroma1.it Prestazioni dei sistemi di rete 2 Overview Basic concepts Characterization of traffic properties that are important to measure
More informationA Passive Approach to Wireless NIC Identification
A Passive Approach to Wireless NIC Identification Cherita Corbett Georgia Institute of Technology IEEE ICC 2006 June 13, 2006 Presentation Outline Motivation & Background Objective NIC Identification using
More informationBasic processes in IEEE networks
Module contents IEEE 802.11 Terminology IEEE 802.11 MAC Frames Basic processes in IEEE802.11 networks Configuration parameters IEEE 802.11 Terminology Station (STA) Architecture: Device that contains IEEE
More information15-441: Computer Networking. Wireless Networking
15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing
More informationWL-5420AP. User s Guide
WL-5420AP User s Guide Table of contents INTRODUCTION... 1 About the Operation Modes...2 LED Indicators...5 Solid...5 Ports on the Rear Panel...7 GETTING CONNECTED... 8 WPA AP -CONFIGURATION VIA WEB...
More informationAnalysis of WLAN Traffic in the Wild
Analysis of WLAN Traffic in the Wild Caleb Phillips and Suresh Singh Portland State University, 1900 SW 4th Avenue Portland, Oregon, 97201, USA {calebp,singh}@cs.pdx.edu Abstract. In this paper, we analyze
More informationCollisions & Virtual collisions in IEEE networks
Collisions & Virtual collisions in IEEE 82.11 networks Libin Jiang EE228a project report, Spring 26 Abstract Packet collisions lead to performance degradation in IEEE 82.11 [1] networks. The carrier-sensing
More informationHow to Choose the Right Bus for Your Measurement System
1 How to Choose the Right Bus for Your Measurement System Overview When you have hundreds of different data acquisition (DAQ) devices to choose from on a wide variety of buses, it can be difficult to select
More informationFPGA based Network Traffic Analysis using Traffic Dispersion Graphs
FPGA based Network Traffic Analysis using Traffic Dispersion Graphs 2 nd September, 2010 Faisal N. Khan, P. O. Box 808, Livermore, CA 94551 This work performed under the auspices of the U.S. Department
More informationTesting Network Infrastructure
Testing Network Infrastructure February 2016 Dan Payerle IDEAL Networks Network Infrastructure The infrastructure of a network can be summarized into two categories, passive cabling and active equipment.
More informationWi-Fi Advanced Stealth
Wi-Fi Advanced Stealth Laurent BUTTI and Franck VEYSSET hack.lu, Luxembourg October 19-21, 2006 firstname[dot]lastname[at]francetelecom[dot]com Who Are We? Network security geeks (?) in R&D labs Working
More informationHome Area Networks. Outline
Home Area Networks CS 687 University of Kentucky Fall 2015 Acknowledgment: Some slides are adapted from the slides distributed with the book Computer Networking: A Top Down Approach, 5th edition. Jim Kurose,
More informationRobust TCP Stream Reassembly In the Presence of Adversaries
Robust TCP Stream Reassembly In the Presence of Adversaries Sarang Dharmapurikar and Vern Paxson Washington Univ. UC Berkeley Usenix Security 2005 Presented by N. Sertac Artan Motivation TCP Reassembly
More informationBandwidth estimations
Bandwidth estimations for Test Traffic Measurements project Henk Uijterwaal Mark Santcroos RIPE NCC New Projects Group BEst2003, December 9 1 RIPE NCC Regional Internet Registry for Europe Based in Amsterdam,
More informationCSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology
CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part II WiFi vs 802.11 IEEE 802.11 Features Hidden Node
More informationIntel Core i5 or higher 2.2 GHz CPU or higher 8GB RAM or higher Windows 10 Professional
Admin Training Guide Version 1.10 February 2018 Action Items Prior to setting up and installing your BlueJeans Room, it is recommended that the following items are reviewed beforehand as they will come
More informationFlowMon ADS implementation case study
FlowMon ADS implementation case study Kamil Doležel Kamil.dolezel@advaict.com AdvaICT, a.s. Brno, Czech Republic Abstract FlowMon ADS implementation provides completely new insight into networks of all
More informationMaster Course Computer Networks IN2097
Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Chapter 7 - Network Measurements Introduction Architecture & Mechanisms
More informationCSCI-1680 Wireless Chen Avin
CSCI-1680 Wireless Chen Avin Based on slides from Computer Networking: A Top Down Approach - 6th edition Administrivia TCP is due on Friday Final Project is out (fun, two weeks) Wireless and Mobile Networks
More informationThe Impact of Transport Header Encryption on Operation and Evolution of the Internet
The Impact of Transport Header Encryption on Operation and Evolution of the Internet draft-fairhurst-tsvwg-transport-encrypt Gorry Fairhurst University of Aberdeen (MAMI) Colin Perkins University of Glasgow
More informationA Non-Parametric Approach to Generation and Validation of Synthetic Network Traffic
The UNIVERSITY of NORTH CAROLINA at CHAPEL HILL A Non-Parametric Approach to Generation and Validation of Synthetic Network Traffic Félix Hernández-Campos ndez-campos Kevin Jeffay Don Smith Department
More informationOutline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.
Outline 18-759: Wireless Networks Lecture 10: 802.11 Management Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2016 http://www.cs.cmu.edu/~prs/wirelesss16/
More informationMobile and Sensor Systems
Mobile and Sensor Systems Lecture 1: Introduction to Mobile Systems Prof Cecilia Mascolo About Me time In this course The course will include aspects related to general understanding of Mobile and ubiquitous
More informationModeling Time-variant User Mobility in Wireless Mobile Networks (Time-variant Community (TVC) Model)
Modeling Time-variant User Mobility in Wireless Mobile Networks (Time-variant Community (TVC) Model) Wei-jen Hsu, Dept. of CISE, U. of Florida Thrasyvoulos Spyropoulos, INRIA, Sophia-Antipolis, France
More information10/21/2013. The ubiquity of social media has lead inevitably to the involvement of digital evidence in nearly every segment of Criminal Practice
Adam Zion Director of Information Technology Office of the Kings County District Attorney The ubiquity of social media has lead inevitably to the involvement of digital evidence in nearly every segment
More informationEnhanced Power Saving Scheme for IEEE DCF Based Wireless Networks
Enhanced Power Saving Scheme for IEEE 802.11 DCF Based Wireless Networks Jong-Mu Choi, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication Ajou University, Republic of Korea
More informationChristos Papadopoulos
CS557: Measurements Christos Papadopoulos Adapted by Lorenzo De Carli Outline End-to-End Packet Dynamics - Paxon99b Wireless measurements - Aguayo04a Note: both these studies are old, so the results have
More informationMAC in /20/06
MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to
More informationTELE3119 Trusted Networks Lab 1(a),(b) Sniffing wireless traffic
TELE3119 Trusted Networks Lab 1(a),(b) Sniffing wireless traffic [10 points, Due Week 5] Part (a) Objective: The objective of this exercise is to setup an infrastructure for capturing the network traffic
More informationWi-Fi Advanced Stealth BlackHat US, Las Vegas August 2-3, 2006
Wi-Fi Advanced Stealth BlackHat US, Las Vegas August 2-3, 2006 Laurent BUTTI & Franck VEYSSET France Telecom Division R&D firstname dot lastname AT orange-ft dot com Who Are We? Network security experts
More informationNomadic Communications Labs. Alessandro Villani
Nomadic Communications Labs Alessandro Villani avillani@science.unitn.it Ad Hoc Networks Ad Hoc Networks(IBSS) The wireless LANs we usually know make use of the mode infrastructured which requires one
More informationWireless and Mobile Networks Reading: Sections 2.8 and 4.2.5
Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained
More informationWireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1
Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices
More informationEfficient solutions for the monitoring of the Internet
Efficient solutions for the monitoring of the Internet Chadi BARAKAT INRIA Sophia Antipolis, France Planète research group HDR defense January 22, 2009 Email: Chadi.Barakat@sophia.inria.fr WEB: http://www.inria.fr/planete/chadi
More informationStrategies for sound Internet measurement
Strategies for sound Internet measurement Vern Paxson IMC 2004 Paxson s disclaimer There are no new research results Some points apply to large scale systems in general Unfortunately, all strategies involve
More informationDensity-Aware Routing in Highly Dynamic DTNs: The RollerNet Case
Density-Aware Routing in Highly Dynamic DTNs: The RollerNet Case Pierre-Ugo Tournoux, Student Member, IEEE, Je re mie Leguay, Farid Benbadis, John Whitbeck, Student Member, IEEE, Vania Conan, and Marcelo
More informationDiagnosis in the Time-Triggered Architecture
TU Wien 1 Diagnosis in the Time-Triggered Architecture H. Kopetz June 2010 Embedded Systems 2 An Embedded System is a Cyber-Physical System (CPS) that consists of two subsystems: A physical subsystem the
More informationAdmission Control in Time-Slotted Multihop Mobile Networks
dmission ontrol in Time-Slotted Multihop Mobile Networks Shagun Dusad and nshul Khandelwal Information Networks Laboratory Department of Electrical Engineering Indian Institute of Technology - ombay Mumbai
More informationCisco Connected Mobile Experiences (CMX) Hyperlocation Quick Start Guide
Cisco Connected Mobile Experiences (CMX) Hyperlocation Quick Start Guide This document details the procedure involved in using the Hyperlocation add-ons to the Cisco 3600 and Cisco 3700 Access Points to
More informationWi-Fi 6 What s It All About?
WHITE PAPER Wi-Fi 6 What s It All About? By Cees Links, GM of Qorvo Wireless Connectivity Business Unit Formerly Founder & CEO of GreenPeak Technologies Is Wi-Fi Running Out of Steam? Despite that nobody
More informationRefocusing in Wireless Measurement
Refocusing in 802.11 Wireless Measurement Udayan Deshpande 1, Chris McDonald 2, and David Kotz 1 1 Institute for Security Technology Studies, Department of Computer Science, Dartmouth College 2 School
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK CONTROLLING PC THROUGH MOBILE PHONE MISS. MUKTA N. PATIL, PROF. SHEETAL P. GAWANDE
More informationCOPYRIGHTED MATERIAL. Index
Index Symbols and Numbers $ (dollar sign), in folder share names, 117 802.11a standard definition, 22 speed, 26 802.11b standard 802.11g standard 802.11i standard, 23 A access points compatibility, 45
More information