1 William Lee Duke University Department of Electrical and Computer Engineering Durham, NC 27708 Analysis of a Campus-wide Wireless Network February 13,

Slides:



Advertisements
Similar presentations
SEMINAR ON Wi-Fi.
Advertisements

1 Fault Analysis for Large-scale Campus-wide Wireless Networks Jian Chen Department of CS, Tsinghua University, Beijing, China.
IEEE PIMRC A Comparative Measurement Study of the Workload of Wireless Access Points in Campus Networks Maria Papadopouli Assistant Professor Department.
Analysis of a Campus-wide Wireless Network David Kotz Kobby Essien Dartmouth College September 2002.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
IFIP Performance Remote Analysis of a Distributed WLAN using Passive Wireless-side Measurement Aniket Mahanti Carey Williamson Martin Arlitt University.
An Empirical Study of Real Audio Traffic A. Mena and J. Heidemann USC/Information Sciences Institute In Proceedings of IEEE Infocom Tel-Aviv, Israel March.
1 Fall 2005 Hardware Addressing and Frame Identification Qutaibah Malluhi CSE Department Qatar University.
Security Awareness: Applying Practical Security in Your World
Network Traffic Measurement and Modeling CSCI 780, Fall 2005.
Network Monitoring: A Practical Approach Philip Smith/IT Services University of Windsor March 21, 2003.
IEEE Wireless Local Area Networks (WLAN’s).
1 TCP Traffic Analysis in cooperation with Motorola Todd DeSantis and David Loose Advisor: Professor Mark Claypool Co-Advisor: Professor Robert Kinicki.
Passive traffic measurement Capturing actual Internet packets in order to measure: –Packet sizes –Traffic volumes –Application utilisation –Resource utilisation.
Wireless LANs A Case Study of Baylor University’s Wireless Network Copyright Bob Hartland 2002 This work is the intellectual property of the author. Permission.
Yung-Chih Chen Jim Kurose and Don Towsley Computer Science Department University of Massachusetts Amherst A Mixed Queueing Network Model of Mobility in.
IE 419/519 Wireless Networks Lecture Notes #2 Wireless LAN Technology.
IEEE Wireless LAN Standard
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
Modeling client arrivals at access points in wireless campus-wide networks Maria Papadopouli Assistant Professor Department of Computer Science University.
Topic on WLANS IEEE (Hao Lian) Analysis of campus wireless network(Ao Shen) Comparison between 3G and Wi- Fi(Bichen Wang, Chen Chen)
195Eg Ethernet Wired LAN 195Eg. Wireless Ethernet Setting IP Address Using Utility Programs Begin Programming Definition Selection Programming Modes of.
Managing DHCP. 2 DHCP Overview Is a protocol that allows client computers to automatically receive an IP address and TCP/IP settings from a Server Reduces.
M. Papadopouli 1,2,3, M. Moudatsos 1, M. Karaliopoulos 2 1 Institute of Computer Science, FORTH, Heraklion, Crete, Greece 2 University of North Carolina,
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 24 November 11, 2004.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
1. There are different assistant software tools and methods that help in managing the network in different things such as: 1. Special management programs.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
First step into Trace Analysis. What is Trace Measurement data from real world networks Wired networks: netflow traces Wireless networks: Association.
Monitoring for network security and management Cyber Solutions Inc.
Session 2 Security Monitoring Identify Device Status Traffic Analysis Routing Protocol Status Configuration & Log Classification.
WIRELESS IN YOUR LIBRARY The Anatomy of a Library Communications Network.
COEN 252 Computer Forensics Collecting Network-based Evidence.
Release 16/07/2009Jetking Infotrain Ltd. Assembling and Cabling Cisco Devices Chapter 3.
Chapter Three Network Protocols By JD McGuire ARP Address Resolution Protocol Address Resolution Protocol The core protocol in the TCP/IP suite that.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 6: Implement Wireless Scalability.
Spatio-Temporal Modeling of Traffic Workload in a Campus WLAN Felix Hernandez-Campos 3 Merkouris Karaliopoulos 2 Maria Papadopouli 1,2,3 Haipeng Shen 2.
Wireless Trace Analysis Suyong Lee and Renata Aryanti Advisor: Prof. Suman Banerjee With assistance of : Vladimir Brik and Michael Blodget Fall 2007.
1 Voice Traffic Engineering & Management. 2 PSTN and PBX networks are designed with 2 objectives: Maximize usage of their circuits Maximize usage of their.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
ﺑﺴﻢﺍﷲﺍﻠﺭﺣﻣﻥﺍﻠﺭﺣﻳﻡ. Group Members Nadia Malik01 Malik Fawad03.
CSE 6590 Department of Computer Science & Engineering York University 111/9/ :26 AM.
Wireless Network Design Principles Mobility Addressing Capacity Security.
Preserving Location Privacy in Wireless LANs Jiang, Wang and Hu MobiSys 2007 Presenter: Bibudh Lahiri.
Characterising the Use of a Campus Wireless Network 徐 志 賢 Paper From: D. Schwab and R.B. Bunt, "Characterising the Use of a Campus Wireless Network", Proc.
The Changing Usage of a Mature Campus-wide Wireless Network CS525m – Mobile and Ubiquitous Computing Andrew Stone.
Presented by Rebecca Meinhold But How Does the Internet Work?
Wireless Trace Analysis. Project Goals Summary of project goals: First goal: analyze wireless access patterns Second goal: implement Markov predictor.
1 LAN – local area network overview: 1.Types of networks 2.Network topology 3.LAN local area networks 4.Introduction to TCP/IP 5.IEEE / Wireless.
1 Microsoft Windows 2000 Network Infrastructure Administration Chapter 4 Monitoring Network Activity.
August 27, 2003 Evaluation of WiNc Manager A Wireless Network Management Software from Cirond Technologies Inc. by Kassim Olawale Radio Science Laboratory.
WLAN.
Prediction-based Handoff in Heterogeneous Networks Bill Phillips 09 March 2007.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
Wi-Fi Technology PRESENTED BY:- PRIYA AGRAWAL.
1 Internet Traffic Measurement and Modeling Carey Williamson Department of Computer Science University of Calgary.
COMP2322 Lab 1 Introduction to Wireless LAN Weichao Li Apr. 8, 2016.
Wired and Wireless network management 1. outline 2 Wireless applications Wireless LAN Wireless LAN transmission medium WLAN modes WLAN design consideration.
Network Traffic Monitoring and Analysis - Shisheer Teli CCCF.
Introduction to “Tap – Dance ”. Company Proprietary Presentation Topics  Introduction  Handover scenarios  Inter-Network Handover consequences  Common.
Intention – Understanding the features of the following networks
Wireless Ethernet Programming
Integration of and Third-Generation Wireless Data Networks
3 | Analyzing Server, Network, and Client Health
TCP/IP Protocol Suite: Review
II - BACKGROUND & MOTIVATION IV - ANTICIPATED OUTCOMES
Computer Networks Protocols
Load balancing of a wireless network
Presentation transcript:

1 William Lee Duke University Department of Electrical and Computer Engineering Durham, NC Analysis of a Campus-wide Wireless Network February 13, 2007

2 Nature of the problem OBJECTIVE: To understand user behavior as well as physical mobility within a campus environment BACKGROUND: WLANs are increasingly common particularly on university and corporate campuses. IEEE b is broadly deployed, but little known about how networks used. Extension upon WaveLAN (building) and Metricom (geographical area) study by Tang and Baker Dartmouth size, population diversity, and detail of data collection offer extensive insight into wireless network usage

Outline Test Environment Trace Data Collection Analysis Summary

Test Environment Preformed at Dartmouth College campus using 476 APs spread over 161 buildings (200 acres with administrative, academic, residential, and athletic buildings). Each AP has a range of about feet indoors. All APs share the same network name allowing wireless clients to roam seamlessly from one AP to another. 161 covered buildings span 81 subnets  roaming from buildings require new IP addresses

Trace Data Collection 11 week Fall 2001 term data collection (Sept 25 – Dec 10) Data limited to active periods (Fall Term) Incomplete due to power loss Syslog –APs transmit a system log message SNMP –Simple Network Management Protocol used to poll APs Sniffers –Tcpdump used to capture all packet headers Syslog and SNMP traces used to compute basic statistic about traffic, users, and mobility

General Definitions Card Access Point Begin Session Associate Active Card End Session Deassociate Roamer Card

Syslog Of 476 APs only 430 represented (some never used  misconfigured) APs configured to transmit every time a client card authenticated, associated, reassociated, dissociated, or deauthenticated with the AP. Syslog uses UDP (user datagram protocol) therefore messages potentially lost or misordered (recall difference between TCP) Network does not use MAC authentication or IP authentication  IP addresses given to users vary from time to time and building to building Assumed one card per user (users with multiple cards/shared cards)

Syslog Messages AuthenticateAssociate Reassociate Roamed Disassociate

SNMP Of 476 APs only 451 monitored Used to periodically poll the APs (poll every 5 min) Each poll returned MAC addresses of recently associated client stations and two counters (inbound, and outbound bytes) SNMP contains list of cards but syslog data used for tracking cards as syslog provides the exact series of events for each card while SNMP polling is less precise

Sniffers Of 451 APs only 22 monitored Tcpdump used to capture all of the packet headers Packet headers recorded for privacy Holes caused by power outages Sniffer Switch port on campus network

Analysis During trace period 1706 unique cards identified. Distributed among 161 buildings with (82 residential, 32, academic, 6 library, 19 social, and 22 administrative) –Traffic –Card Activity –AP Activity –Building Activity

Traffic 3.3 terabytes of total traffic (half caused by 5% of cards) Less outbound traffic than inbound traffic, daily variation ( %) Data skewed by activity in particular buildings Most users limit their activity to a few key sites in their daily routine. SNMP Daily Traffic (GB) SNMP Daily Traffic per Card (GB)

Card Activity Half the card population active on a typical day, and a third of those are mobile Users varied in the number of days that they used their cards from once to every day during the trace period Median card movement of five buildings (9 APs) and no card visiting greater than half of the entire network. Median session length was 16.6 min Extremely long sessions are likely artifacts of holes in the syslog data where session-ending message was lost Most (82%) sessions are non-roaming Nearly 60% of roaming sessions roamed only within one subnet

Card Activity (Cont.) The cards aggressively search for a strong signal, and in an environment with many APs and overlapping cells, cards will roam frequently. Either card firmware needs to be less aggressive, or environment needs to reduce the resulting load on the network, and give better service to the user Syslog Active,Mobile, and Roamer cards per day

AP Activity There are many locations where a card may associate with APs in multiple buildings, despite being physically stationary APs with the most active cards in their busiest hour were those located near large lecture halls The busiest AP had 71 active cards APs varied widely in the amount of traffic they handled Syslog Number of active cards per hourSyslog Mean active cards per hour

Building Activity Residential users spend more hours in residences than most people spend in other buildings. Buildings with the busiest hour in terms of active cards are mostly buildings with large lecture halls SNMP Average Daily Traffic per Card (GB) SNMP Average Daily Traffic (GB)

Summary Largest trace-based study conducted Activity and traffic varied widely from hour to hour, day to day, and week to week Wireless cards are extremely aggressive when associating with APs leading to large number of short sessions and high degree of roaming within a session A new solution is necessary to prevent cards from roaming too frequently without sacrificing coverage Most users visited few APs and building over life of the trace

Questions

Protocols

Traffic