Characterising the Use of a Campus Wireless Network 徐 志 賢 Paper From: D. Schwab and R.B. Bunt, "Characterising the Use of a Campus Wireless Network", Proc.

Slides:



Advertisements
Similar presentations
IEEE INFOCOM 2004 MultiNet: Connecting to Multiple IEEE Networks Using a Single Wireless Card.
Advertisements

Terena Mobility Taskforce update Klaas Wierenga SURFnet.
Auto Configuration and Mobility Options in IPv6 By: Hitu Malhotra and Sue Scheckermann.
5.1 Overview of Network Access Protection What is Network Access Protection NAP Scenarios NAP Enforcement Methods NAP Platform Architecture NAP Architecture.
Wireless and Switch Security NETS David Mitchell.
1 William Lee Duke University Department of Electrical and Computer Engineering Durham, NC Analysis of a Campus-wide Wireless Network February 13,
Analysis of a Campus-wide Wireless Network David Kotz Kobby Essien Dartmouth College September 2002.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
An Empirical Study of Real Audio Traffic A. Mena and J. Heidemann USC/Information Sciences Institute In Proceedings of IEEE Infocom Tel-Aviv, Israel March.
Wireless networking Roger Treweek Oxford University Computing Services.
Security Awareness: Applying Practical Security in Your World
Wireless Networking WAN Design Module-06
Firewalls CS591 Topics in Internet Security November Steve Miskovitz, Steve Peckham, Kan Hayashi.
Mesh Network Technical Guide for the Mesh AP Topic 2 Installation Knowledge / Network Design Copyright © PLANET Technology.
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
NetComm Wireless Transparent Bridge Mode Feature Spotlight.
1 CDMA/GPRS Roaming Proposals Raymond Hsu, Jack Nasielski Feb
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 9 Network Policy and Access Services in Windows Server 2008.
Virtual Private Networks (Tunnels). When Are VPN Tunnels Used? VPN with PPTP tunnel Used if: All routers support VPN tunnels You are using MS-CHAP or.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Networking Components
Mobile IP Seamless connectivity for mobile computers.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
Intranet, Extranet, Firewall. Intranet and Extranet.
1 October 20-24, 2014 Georgian Technical University PhD Zaza Tsiramua Head of computer network management center of GTU South-Caucasus Grid.
1 Week #7 Network Access Protection Overview of Network Access Protection How NAP Works Configuring NAP Monitoring and Troubleshooting NAP.
Shark: A Wireless Internet Security Test Bed Senior Design Project May07-09 Stephen Eilers Jon Murphy Alex Pease Jessica Ross.
Computer Networks Unit 1 – BTA 3O Ms. Chytra. Introduction to Networks Most people working in an office with more than a few computers will be using some.
70-411: Administering Windows Server 2012
First step into Trace Analysis. What is Trace Measurement data from real world networks Wired networks: netflow traces Wireless networks: Association.
Implementing Network Access Protection
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
1 Can DHCP support mobility across LANs (on different subnets?)  On its own, the answer is NO; for reasons cited in DHCP talk on slide 9.  However,
Module 3: Designing IP Addressing. Module Overview Designing an IPv4 Addressing Scheme Designing DHCP Implementation Designing DHCP Configuration Options.
Module 11: Remote Access Fundamentals
Environment => Office, Campus, Home  Impact How, not Whether A Checklist for Wireless Access Points.
Module 8: Configuring Network Access Protection
TELE 301 Lecture 10: Scheduled … 1 Overview Last Lecture –Post installation This Lecture –Scheduled tasks and log management Next Lecture –DNS –Readings:
1 CS 425 Distributed Systems Fall 2011 Slides by Indranil Gupta Measurement Studies All Slides © IG Acknowledgments: Jay Patel.
1 Second ATLAS-South Caucasus Software / Computing Workshop & Tutorial October 24, 2012 Georgian Technical University PhD Zaza Tsiramua Head of computer.
Wireless Trace Analysis Suyong Lee and Renata Aryanti Advisor: Prof. Suman Banerjee With assistance of : Vladimir Brik and Michael Blodget Fall 2007.
1 Chapter 7: NAT in Internet and Intranet Designs Designs That Include NAT Essential NAT Design Concepts Data Protection in NAT Designs NAT Design Optimization.
Improved Access Point Selection MobiSys2006. Outline INTRODUCTION FIELD STUDY VIRGIL EVALUATION CONCLUSION.
A ISP free video conferencing application for mobile devices using wireless and VoIP Technology.
Designed to configure regardless of IP address on computer Will display 195E by Ethernet MAC address Configures IP Address to 195EUpdate FirmwareOpen.
Resnet Enhancements and Directions Part 1, Bruce Campbell, Information Systems and Technology.
Wireless Network Design Principles Mobility Addressing Capacity Security.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Configuring Network Access Protection
The Changing Usage of a Mature Campus-wide Wireless Network CS525m – Mobile and Ubiquitous Computing Andrew Stone.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
KAIS T On the problem of placing Mobility Anchor Points in Wireless Mesh Networks Lei Wu & Bjorn Lanfeldt, Wireless Mesh Community Networks Workshop, 2006.
Module 10: Providing Secure Access to Remote Offices.
BY: CHRIS GROVES Privacy in the Voting Booth. Reason for Privacy Voters worry that their vote may be held against them in the future  People shouldn’t.
Unit 2 - Hardware Networking. What is a network? A computer network is essentially a connection between two or more computers. This connection can be.
1 NES554: Computer Networks Defense Course Overview.
Networking Components Assignment 3 Corbin Watkins.
1 Apricot2001 Effectiveness of VLAN Chan Wai Kok Faculty of Information Technology Salim Beg Faculty of Engineering.
Assignment # 3 Networking Components By: Jeff Long.
: MobileIP. : r Goal: Allow machines to roam around and maintain IP connectivity r Problem: IP addresses => location m This is important for efficient.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY IT375 Window Enterprise Administration Course Name – IT Introduction to Network Security Instructor.
Chapter TCP/IP in the Windows Environment © N. Ganesan, Ph.D., All rights reserved.
Wireless Ethernet Programming
Copyright Joel Rosenblatt 2010
Implementing Network Access Protection
Computer Data Security & Privacy
Wireless Modes.
Instructor Materials Chapter 8: Applied Networking
Mobile IP Neil Tang 11/12/2008 CS440 Computer Networks.
Presentation transcript:

Characterising the Use of a Campus Wireless Network 徐 志 賢 Paper From: D. Schwab and R.B. Bunt, "Characterising the Use of a Campus Wireless Network", Proc. IEEE Infocom 2004, Hong Kong, March 7-12, 2004.

2 Outline Overview Campus Characteristics Wireless Network Environment Trace Methodology Trace Results Conclusion

3 Overview Analysis of wireless usage at the University of Saskatchewan –Where –When –How much Trace allows evaluation of network design principles and plans for future development

4 Campus Characteristics 40 Buildings with over 363 acres of land 18,000 students attend the university

5 Wireless Network Environment Initial deployment in 2001 with 18 APs –Dispersed through various buildings –Not well advertised Wireless traffic is routed on a virtual private network with a unique subnet –Assign internal IP address by a DHCP Server Cicsco LEAP authentication is used to provide access to wireless

6 LEAP Authentication Process

7 Trace Methodology Re-programming campus router and Mirrored wireless packets to a computer port monitoring traffic Used EtherPeek to log packet data Used LEAP server to track authentication data Trace began Jan 22, 2003 and lasted one week Data analyzed with perl script

8 Trace Methodology (Cont) Anonymisation –authentication log was stripped of user identifications, leaving only machine addresses as identifiers. –IP addresses were only temporary addresses assigned by campus DHCP server. –No message bodies 、 No private information

9 Trace Results AttributeValue Total Packets24,431,794 Total Seconds603,054 Average Seconds 40.5 packets per second Total Time 6 days, 23 hours, 30 minutes, and 54 seconds Spurious wired multicast overhead recorded (38% of traffic)

10 Authentication Data Large number of authentications per user –Wireless cards store user/pass –Typical of low and fluctuating signal strength –Oscillations between two APs AttributeValue Total Authentications24973 Unique Users134 Mean Authentications per User186.4 Mode Authentications per User5 Median Authentications per User54.5 Access Points18 Mean Authentications per AP1387.4

11 Data Analysis Number of authentications not related to packet rate –Reasons stated previously Older access points are used more often –More well-known to campus Weekend traffic –Minimal at office locations –Average at social and study locations

12 Traffic vs. Authentications

13 Daily Traffic Patterns

14 Roaming Users connected to average 3 AP and max 8 Direct relation between roaming and proximity Large well clusters of well-known APs incur the most roaming No. of unique user who authenticated at each access point Connected to the location of the access point on the map No. of unique users who authenticated at both the access points connected by the line.

15 Number of Access Points Visited Per User

16 The College of Law Generated 86% of authentications and 33% of packets during trace Law students roamed more frequently Reasons –Center of study and work for law students –Early shift to wireless connectivity –Legal community utilizes digital technology

17 Conclusion Avg wireless user connects a small number of times and only to a few APs Well-known APs were used most heavily Authentications have no relation to usage Roaming is limited Design Principles –Wireless networks should focus on location instead of mobility –APs should be focused on departments with online material –Wireless technology is designed for users of modern mobile computers.

18 中正校園無線網路環境 802.1x VPN RADIUS 漫遊( Proxy RADIUS )