Location Awareness Lancaster Keith Mitchell Computing Department Paul Astle Information Systems Services (ISS)

Slides:



Advertisements
Similar presentations
Unified and Personalised Messaging to Support E-Learning Duncan McCaffery Keith Mitchell Nicholas J.P. Race Mark Bryson Zhen Cai Computing Department Lancaster.
Advertisements

Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
The CA MDB Revised May © 2005 Computer Associates International, Inc. (CA). All trademarks, trade names, services marks and logos referenced.
Services Course Windows Live SkyDrive Participant Guide.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
Application Guide For Mesh AP – MAP-3120
1 © 2005 Cisco Systems, Inc. All rights reserved. CONFIDENTIAL AND PROPRIETARY INFORMATION Cisco Wireless Strategy Extending and Securing the Network Bill.
Implementing a Highly Available Network
Tracking & Login Data persistence User tracking.
Location Awareness Wireless Trial Programme 2008 By Gareth Ayres.
Eduroam – Roam In a Day Louis Twomey, HEAnet Limited HEAnet Conference th November, 2006.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Firewalls and Intrusion Detection Systems
Supervisor: Amichai Shulman Students: Vitaly Timofeev Eyal Shemesh.
1 CCNA 2 v3.1 Module 4. 2 CCNA 2 Module 4 Learning about Devices.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialBCMSN Configuring Wireless LANs BCMSN Module 6 Lesson 6.
Wireless LAN Topology Visualiser Project Supervisor: Dr Arkady Zaslavsky Project Team Members: Jignesh Rambhia Robert Mark Bram Tejas Magia.
Middleware & Applications for Mobile Collaboration Prof. Markus Endler Laboratory for Advanced Collaboration (LAC) PUC-Rio
Electrical and Computer Engineering PeopleFinder Vitaly Gordievsky Alex Trefonas Scott Richard Matt Beckford Midway Design Review.
Performed by:Gidi Getter Svetlana Klinovsky Supervised by:Viktor Kulikov 08/03/2009.
CH 13 Server and Network Monitoring. Hands-On Microsoft Windows Server Objectives Understand the importance of server monitoring Monitor server.
Windows Server 2008 Chapter 11 Last Update
ONLINE CLAIMS TRACKING
Ch. 5 – Access Points. Overview Access Point Connection.
Light Weight Access Point Protocol (LWAPP) IETF 57 Pat Calhoun, Airespace.
NOX an OpenFlow controller. Role of Controller in OpenFlow Environments Push forwarding logic to switches Give developers a high-level API to develop.
– Chapter 5 – Secure LAN Switching
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
Network Security1 – Chapter 5 – Secure LAN Switching Layer 2 security –Port security –IP permit lists –Protocol filtering –Controlling LAN floods (using.
LiveCycle Data Services Introduction Part 2. Part 2? This is the second in our series on LiveCycle Data Services. If you missed our first presentation,
Installation Verification Last Update Copyright Kenneth M. Chipps Ph.D.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Supercomputing Communications Data NCAR Scientific Computing Division NETS 12/10/ Network Engineering & Telecommunications Section Update Jim Van.
1 Improving Security Through Automated Policy Compliance Christopher Stevens Director of Network and Technical Services Lewis & Clark College Educause.
Chapter 6 Server-side Programming: Java Servlets
IFORM ACCOUNT MAINTENANCE ICT4D SESSION 4. IFORMBUILDER WEBSITE REQUIREMENTS To access the iFormBuilder website, you need the following items: -Reliable.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
4BP1 Electronic & Computer Engineering Paul Gildea th Year Interim Project Presentation.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
A Collaborative Framework for Scientific Data Analysis and Visualization Jaliya Ekanayake, Shrideep Pallickara, and Geoffrey Fox Department of Computer.
1.Registration block send request of registration to super peer via PRP. Process re-registration will be done at specific period to info availability of.
Wireless Trace Analysis. Project Goals Summary of project goals: First goal: analyze wireless access patterns Second goal: implement Markov predictor.
Saving State on the WWW. The Issue  Connections on the WWW are stateless  Every time a link is followed is like the first time to the server — it has.
Winning Wireless Applications Corina Moore PrinterOn Corporation
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
FriendFinder Location-aware social networking on mobile phones.
FriendFinder Location-aware social networking on mobile phones.
7.4 Update - ISE Session.
Network Equipment Assignment 3 LTEC 4550 Aaron Whitaker.
IPS Infrastructure Technological Overview of Work Done.
START Application Spencer Johnson Jonathan Barella Cohner Marker.
PNNL Site Update July, 2009 Lewis Allen, Network Engineer.
Model: DS-600 5x 10/100/1000Mbps Ethernet Port Centralized WLAN management and Access Point Discovery Manages up to 50 APs with access setting control.
Redmond Protocols Plugfest 2016 Ron Starr, Paul Bartos, Hagit Galatzer, Stephen Guty New and Modified Windows Protocol Documents.
Tracking Hosted Buyer Meetings September 25 th, 2013 Stéphane Doutriaux –
Virtual Local Area Networks In Security By Mark Reed.
Cardiff Location Aware Activities, Problems, Aims 3 rd September 08 Anthony Cope Mike Jorgenson.
ArcGIS for Server Security: Advanced
Progress Apama Fundamentals
Facility Portal and Work Order Manager
Instructor Materials Chapter 9: Testing and Troubleshooting
Registering for Revel™
Registering for Revel™
Get Dumps PDF Dumps Study Material Dumps4download
Understanding Wi-Fi Direct in Windows 8
Epic Access.
Chapter 8: Monitoring the Network
Risks of Wireless Access Points
Erik Porter Program Manager ASP.NET Microsoft Corporation
Presentation transcript:

Location Awareness Lancaster Keith Mitchell Computing Department Paul Astle Information Systems Services (ISS)

Contents Summary of Trial Activities o B1. Context-Aware Security o B3. Asset Tracking Progress to date Results / Issues Next Steps

Campus Wireless Network - recap Approaching 400 thin AP’s LWAPP controllers purchased WCS and Location appliance installed Covers social areas, teaching spaces and lecture theatres Using Cisco Location API (XML / SOAP) for trials

B1: Context-Aware Security & B2: Asset Tracking B1: Can we create an RF (geographic) firewall o Room, not building or AP based resolution Aim: o Develop a service to disable clients within a LT B2: Use LWAPP to register devices sightings o Update students records automatically/directly Aim: o User registration via simple web page / application o Time stamp MAC sightings with physical locations o Include understanding privacy implications of tracking

For those with a good memory We also proposed a Community Activity o Later dropped! o Obtaining location (triangulation) using wireless MESH seemed to be quite an engineering challenge and more suited to a larger project!

Progress To Date Good progress overall o Test app to query via Loc API B1 & B2 rely on accurate data from the API o Some issues:  Accuracy, timeliness, incompleteness, scale (?) o Security Project has 2 aspects to the project  Location Tracking & Authentication System  Different Systems  Keith – Location Tracking  Paul - Authentication

Progress To Date What we can do o Determine and Manage location  Ascertain location (building, floor, x,y) for a device  Filter Results (associated, ssid, within N mins/hours)  Determine if in a ‘Coverage Area’ (i.e. George Fox LT1)  Modify Asset Information per device  Name/Group are RW. Most attributes RO What we cannot (yet) do o Ascertain vlan_id and username directly  But we (think we) can indirectly. Return to this later o Chop them off the network – B1  We have a plan o Update the records – B2  We have another plan

Results/Issues Location Accuracy o Density of APs o Location of Aps o Quality of map data o Device Differences  Sony Viao, Dell D620, Nokia N95 8GB, Apple iPhone – see map o Confidence factor  Always large value Timelines o Location updates ~ 30 sec intervals o Asset Info updates immediate

Help

Results / Issues Incompleteness o Null data returned consistently Scale o X,Y values do not seem to correlate to Images o Very confusing o Consistent, so not an issue, more an annoyance Poor Cisco Documentation o Guesswork creating work o Recent update made things slightly better

Help

Client Info

Visual Studio Stack Trace null

Approach to Blocking Users (Paul) Approach A - Running script o getAssociatedClients, check if within coverage area. Check group they belong too (vlan id). Block relevant clients Approach B - Location Appliance to send a SNMP trap messages when something changes in a coverage area. o Define coverage areas in WCS and create Asynchronous events which can post to SNMP or SOAP Listeners Access Control / Blocking o At radio level (layer one)  LWAPP will disconnect clients but clients will not re-associate  without restarting the interface o At network level (layer three) - currently unable to achieve this on our production system.  Approach is to create a test VLAN, pipe this to a new gateway (Linux box) and fudge IP Tables. This method will not kill existing sessions but would prevent new connections. Connect to existing wireless controllers.

Next Steps Paul o Investigate the access control options Keith o Build a mobile app for the registration system  You are Here. Confirm to sign the register. Push to DB.  Modify the Test App Both o Start integrating discovery and access control logic o Test different mobile devices (accuracy)

Help Does anyone have a ‘good’ Cisco contact? o Not a sales droid! o Would really help us to have a conversation about the Location API with them and raise a couple of issues  Null information Does anyone have LWAPP and a Location Appliance running? o Code you carry out some tests/queries -> /dev/null?!

The End Questions ?