Localization in Wireless LANs. Outline  Wireless LAN fundamentals  Wi-Fi Scanner  WLAN Localization  Simple Point Matching  Area Based Probability.

Slides:



Advertisements
Similar presentations
IEEE INFOCOM 2004 MultiNet: Connecting to Multiple IEEE Networks Using a Single Wireless Card.
Advertisements

Continuous Estimation in WLAN Positioning By Tilen Ma Clarence Fung.
Communication Subsystems Physical Link Data Link Network Transport Physical Link Data Link Network Transport Session System 1System 2 Typical layers in.
© 2004 Andreas Haeberlen, Rice University 1 Practical Robust Localization over Large-Scale Wireless Ethernet Networks Andreas Haeberlen Eliot Flannery.
WBest: a Bandwidth Estimation Tool for IEEE Wireless Networks Presented by Feng Li Mingzhe Li, Mark Claypool, and.
LYU0401 Location-Based Multimedia Mobile Service Clarence Fung Tilen Ma Supervisor: Professor Michael Lyu Marker: Professor Alan Liew.
Understanding Networks II. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Mid-term Project Presentation Eli Bendersky Igor Oks.
1 Wireless LANs. 2 Introduction Types of Communication Networks. LAN’s Configurations. Wireless Technology. –Definition. –Applications. –Example. Communications.
7/14/2015 Center for Wireless COMMUNICATIONS COMPUTER SCIENCE and ENGINEERING Real-Time Performance Monitoring and Evaluation of an Wireless LAN.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
1 Protocol Interaction (ISO’s Open Systems Interconnection (OSI model)) the 7 layers.
Wireless Networking 102.
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
Introducing Network Standards Open Systems Interconnection (OSI) Model IEEE 802.x Standard Device Drivers and OSI 1.
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
ITED 328 Lecture 4 12 Feb 2004 Loosely covering Chapter 5 Internet and LAN Technology.
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Basic LAN techniques IN common with all other computer based systems networks require both HARDWARE and SOFTWARE to function. Networks are often explained.
Introduction to Networks CS587x Lecture 1 Department of Computer Science Iowa State University.
Integrated Support for Handoff Management and Context Awareness in Heterogeneous Wireless Networks ACM MPAC’05.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Implementations  Ethernet Networks  Wireless Networks.
The University of Bolton School of Business & Creative Technologies Wireless Networks Introduction 1.
1. Insert the Resource CD into your CD-ROM drive, click Start and choose Run. In the field that appears, enter F:\XXX\Setup.exe (if “F” is the letter of.
Understanding Wireless Networking. WiFi Technology WiFi began as a way to extend home and small office network access without installing more cable. As.
Doc.: IEEE /172r0 Submission March 2003 Byoung-Jo Kim, AT&TSlide 1 NDIS Objects Byoung-Jo “J “ Kim AT&T Labs-Research Mar. ’03, Dallas.
Doc.: IEEE /172r1 Submission NDIS Objects Byoung-Jo “J “ Kim AT&T Labs-Research Mar. ’03, Dallas.
The Limits of Localization Using Signal Strength: A Comparative Study Eiman Elnahrawy, Xiaoyan Li, and Richard Martin Dept. of Computer Science, Rutgers.
Access to Shared Media - Media Access Control protocols RD-CSY10171.
ECE 4450:427/527 - Computer Networks Spring 2015 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 2: Overview of Computer Network.
A PRESENTATION ON “Wireless Networks”
1 Semester 1 CHAPTER 6 REVIEW JEOPARDY Frames Data Link LayerMACAddressingHexadecimalsMiscellaneous
Packet Dispersion in IEEE Wireless Networks Mingzhe Li, Mark Claypool and Bob Kinicki WPI Computer Science Department Worcester, MA 01609
1 LYU0401 Location-Based Multimedia Mobile Service Clarence Fung Tilen Ma Supervisor: Professor Michael Lyu Marker: Professor Alan Liew.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
CSE 6590 Department of Computer Science & Engineering York University 111/9/ :26 AM.
Media Access Control (MAC) addresses in the network access layer ▫ Associated w/ network interface card (NIC) ▫ 48 bits or 64 bits IP addresses for the.
5 SECTION A 1 Network Building Blocks  Network Classifications  LAN Standards  Network Devices  Clients, Servers, and Peers  Physical Topology  Network.
William Stallings Data and Computer Communications
Final Year Project Lego Robot Guided by Wi-Fi (QYA2)
TCP/IP Protocol Architecture CSE 3213 – Fall
1 OSI and TCP/IP Models. 2 TCP/IP Encapsulation (Packet) (Frame)
Network protocols –Nodes of a network must obey some rules if they want to communicate with each other. The set of rules is called network protocol. –The.
CHAPTER 4 PROTOCOLS AND THE TCP/IP SUITE Acknowledgement: The Slides Were Provided By Cory Beard, William Stallings For Their Textbook “Wireless Communication.
1 LAN – local area network overview: 1.Types of networks 2.Network topology 3.LAN local area networks 4.Introduction to TCP/IP 5.IEEE / Wireless.
Microsoft Windows XP Professional
1 Chapter 4. Protocols and the TCP/IP Suite Wen-Shyang Hwang KUAS EE.
Network/Computer Security Workshop, May 06 The Robustness of Localization Algorithms to Signal Strength Attacks A Comparative Study Yingying Chen, Konstantinos.
LANS A Overview (also a Review). NICS  Could be Ethernet, FDDI, Token Ring or Wireless.  Multiple Protocols can be bound to a NIC.  In WinDoze all.
Web: ~ laoudias/pages/platform.htmlhttp://www2.ucy.ac.cy/ ~ laoudias/pages/platform.html
Networking Protocols John R. Durrett ISQS 6343 #1.
3. INTERNETWORKING (PART 1) Rocky K. C. Chang Department of Computing The Hong Kong Polytechnic University 18 February
Copyright © 2003 OPNET Technologies, Inc. Confidential, not for distribution to third parties. Wireless LANs Session
The OSI Model An ISO (International standard Organization) that covers all aspects of network communications is the Open System Interconnection (OSI) model.
LAN Protocols Chapter 5. Learning Objectives Explain the following LAN protocols and how they work with network operating systems: IPX/SPX, NetBEUI, AppleTalk,
The OSI Model. Understanding the OSI Model In early 1980s, manufacturers began to standardize networking so that networks from different manufacturers.
Network architecture model What is an “architecture model”? An architecture model offers a general frame of reference for the problems connected to the.
Chapter Objectives In this chapter, you will learn:
Tutor: Dr. Youssef Harrath
E. Elnahrawy, X. Li, and R. Martin Rutgers U.
RF-based positioning.
3. Internetworking (part 1)
Wireless Local Area Network (WLAN)
network interface card (NIC)
Ken Gunnells, Ph.D. - Networking Paul Crigler - Programming
AirPlace Indoor Positioning Platform for Android Smartphones
ECE 4450:427/527 - Computer Networks Spring 2017
TCP/IP Protocol Suite: Review
Computer Network Overview
TCP/IP Protocol Suite: Review
Presentation transcript:

Localization in Wireless LANs

Outline  Wireless LAN fundamentals  Wi-Fi Scanner  WLAN Localization  Simple Point Matching  Area Based Probability

Wireless LAN  Standard  IEEE a  IEEE b  Also call “Wi-Fi”  operating at 2.4 GHz  11 Mbps  IEEE g  operating at 2.4 GHz  54 Mbps  Future Standard

Wireless LAN  Information  MAC Address  Identifier of the Wireless LAN Access Point (AP)  Provided by the Ethernet LAN in the AP  RSSI  Signal Strength  SSID  Name of AP

Wi-Fi Scanner  Platform  Pocket PC 2003(Windows CE 4.0)  Wi-Fi Network  IEEE b  API  Windows CE.NET 4.2  Tools  Embedded Visual C  Visual Studio.NET 2003

Wi-Fi Scanner  Target  Get two unique information  MAC Address  Signal Strength  Future Application  Develop the 2D Location Algorithm  Provide the Multimedia Services (e.g. streaming service)

Wi-Fi Scanner   Overall Architecture User InterfcaeCore Operations Embedded VC++ DLL (dynamic link library ) Visual.NET 2003

Wi-Fi Scanner Wi-Fi Application MAC Address, Signal Strength Network Driver Interface Specification (NDIS) Application Presentation Session Transport Network Data Link Physical

NDIS  Develop the Network Driver  Support varieties of Network Technology (e.g. Ethernet (IEEE 802.3), Token Ring (IEEE 802.5), and IrDA media)  Portability of drivers between platforms that support NDIS  Network adapter miniport driver

NDIS Architecture Miniport driver -communicate directly with network interface card (NIC)

NDIS User-mode I/O(NDISUIO)  Supports sending and receiving Ethernet frames  Retrieve MediaSense indications  Retrieve signal power indications

NDIS User-mode I/O  Steps to bind the NIC Card  Get Ethernet LAN Adapter (NIC) Name  Create the File Handle to bind NDISUIO  Using the “DeviceIoControl” interface to achieve the required packet

NDIS User-mode I/O  fRetVal = DeviceIoControl( hNdisUio, hNdisUio,IOCTL_NDISUIO_QUERY_OID_VALUE, (LPVOID) pQueryOid, dwQueryBufferSize, dwQueryBufferSize,&dwBytesReturned,NULL); Retrieves NDIS object

NDIS User-mode I/O  struct _NDIS_WLAN_BSSID { ULONG Length; NDIS_802_11_MAC_ADDRESS MacAddress; Uchar Reserved[2]; NDIS_802_11_SSID Ssid; ULONG Privacy; NDIS_802_11_RSSI Rssi; NDIS_802_11_NETWORK_TYPE NetworkTypeInUse; NDIS_802_11_CONFIGURATION Configuration; NDIS_802_11_NETWORK_INFRASTRUCTURE InfrastructureMode; NDIS_802_11_RATES SupportedRates; } NDIS_WLAN_BSSID, *PNDIS_WLAN_BSSID;

WLAN Localization  Point-based approach  Localization goal is to return a single point for the mobile object  Area-based approach  Localization goal is to return the possible locations of the mobile object as an area rather than a single point

Area-based Approach

Advantage of Area-based Approach  Direct the user in the search for an object in a more systematic manner  Presents the user an understanding of the system in a more natural and intuitive manner

Some Terms and Definitions  n Access Points  AP 1, AP 2, …, AP n  Training set T 0  the offline measured signal strengths and locations an algorithm uses  Consists of a set of fingerprints (S i ) at m different areas A i  T 0 = ( A i, S i ), i = 1 … m

Some Terms and Definitions  Fingerprints S i  Set of n signal strengths at A i, one per each access point  The are totally n access points  S i = (s i1, …, s in ), where s ij is the expected average signal strength from AP j

Generating Training Set  In one particular A i, we read a series of signal strengths (s ijk ) for a particular AP j with a constant time between samples  k = 1… o ij,where o ij is the number of samples from AP j at A i  We estimate s ij by averaging the series, {s ij1, s ij2 …, s ijo }

Generating Training Set  We do the same for all n APs, so we have the fingerprints at A i,  S i = (s i1, …, s in )  We do the same for all m areas, so we have the training set  T 0 = ( A i, S i ), i = 1… m

Getting Testing Set  The object to be localized collects a set of received signal strengths (RSS) when it is at certain location  A testing set(S t ) is created similar to the fingerprints in the training set  It is a set of average signal strengths from n APs, S t = (s t1, …, s tn )

Area-based Approach Algorithms  How to use the training set and testing set?  Simple Point Matching  Area Based Probability

Simple Point Matching  Compare the received signal strength (RRS) in the training set and the testing set  Find n set of areas that fall within a threshold of the RSS for each AP j, j =1…n  The RSS with threshold for AP j at position i = s ij ±q  Return the areas formed by intersecting all matched areas from different AP area sets

Simple Point Matching  How to choose the threshold?  q is the standard deviation of signal received from the corresponding AP  The algorithm starts with a very small q  Area sets for some AP may be empty  q is additively increases eg. q, 2q, 3q …

SPM algorithm

Area Based Probability  Goal is to return the area with the highest probability that the object is in  Approach is to compute the likelihood of the testing set (S t ) that matches the fingerprint for each area (S i )

Area Based Probability Assumptions:  Signal received from different APs are independent  For each AP j, j = 1…n, the sequence of RSS s ijk, k = 1… o ij, at each A i in T o is modeled as a Gaussian distribution

Bayes’ rule  We compute the probability of being at different areas A i, on given the testing set S t  P(A i |S t ) = P(S t |A i )* P(A i )/ P(S t ) (1)  P(S t ) is a constant  Assume the object is equally likely to be at any location. P(A i ) is a constant  P(A i |S t ) = c*P(S t |A i )(2)

Area Based Probability  We compute P(S t |A i ) for every area A i,i=1…m,using the Gaussian assumption  Max{P(A i |S t ) } = Max{c*P(S t |A i ) } = Max{P(S t |A i ) } = Max{P(S t |A i ) }  Return the area A i with top probability

Area Based Probability

Reference   Eiman Elnahrawy, Xiaoyan Li, Richard P. Martin,Using Area-based Presentations and Metrics for Localization Systems in Wireless LANs, Department of Computer Science, Rutgers University   Andreas Haeberlen, Eliot Flannery, Andrew M. Ladd, Algis Rudys, Dan S. Wallach and Lydia E. Kavraki, Practical Robust Localization over Large-Scale Wireless Networks, Rice University