Wireless Trace Analysis. Project Goals Summary of project goals: First goal: analyze wireless access patterns Second goal: implement Markov predictor.

Slides:



Advertisements
Similar presentations
Doc.: IEEE /1186r0 Submission October 2004 Aboba and HarkinsSlide 1 PEKM (Post-EAP Key Management Protocol) Bernard Aboba, Microsoft Dan Harkins,
Advertisements

1 Mobility-Based Predictive Call Admission Control and Bandwidth Reservation in Wireless Cellular Networks Fei Yu and Victor C.M. Leung INFOCOM 2001.
Supporting Cooperative Caching in Disruption Tolerant Networks
Enhancing Security Using Mobile Based Anomaly Detection in Cellular Mobile Networks Bo Sun, Fei Yu, KuiWu, Yang Xiao, and Victor C. M. Leung. Presented.
1 Evaluation Rong Jin. 2 Evaluation  Evaluation is key to building effective and efficient search engines usually carried out in controlled experiments.
WiFi VS Cellular “Bringing Secure Payment to the Point Of Service”
Mobility and Predictability of Ultra Mobile Users Jeeyoung Kim and Ahmed Helmy.
1 William Lee Duke University Department of Electrical and Computer Engineering Durham, NC Analysis of a Campus-wide Wireless Network February 13,
Analysis of a Campus-wide Wireless Network David Kotz Kobby Essien Dartmouth College September 2002.
By Libo Song and David F. Kotz Computer Science,Dartmouth College.
TRADING OFF PREDICTION ACCURACY AND POWER CONSUMPTION FOR CONTEXT- AWARE WEARABLE COMPUTING Presented By: Jeff Khoshgozaran.
Self-Correlating Predictive Information Tracking for Large-Scale Production Systems Zhao, Tan, Gong, Gu, Wambolt Presented by: Andrew Hahn.
Observational Tools Dr. Ayers HPER 448 Western Michigan University.
UNC/FORTH Archive of Wireless Traces, Models and Tools 1 Foundation for Research & Technology-Hellas (FORTH) & University of Crete 2 University of North.
Chapter 12: Troubleshooting Networking Problems Network+ Guide to Networks Third Edition.
Handoff Delay for b Wireless LANs Masters Project defense Anshul Jain Committee: Dr. Henning Schulzrinne, Columbia University Dr. Zongming Fei, University.
Wireless “ESP”: Using Sensors to Develop Better Network Protocols Hari Balakrishnan Lenin Ravindranath, Calvin Newport, Sam Madden M.I.T. CSAIL.
Research Methods in MIS
Yung-Chih Chen Jim Kurose and Don Towsley Computer Science Department University of Massachusetts Amherst A Mixed Queueing Network Model of Mobility in.
IEEE Wireless LAN Standard
Modeling client arrivals at access points in wireless campus-wide networks Maria Papadopouli Assistant Professor Department of Computer Science University.
35% 92% 46% 1.37 of IT spend is associated with running and evolving applications of the total application spend is dedicated to maintaining applications.
Yi Wang, Bhaskar Krishnamachari, Qing Zhao, and Murali Annavaram 1 The Tradeoff between Energy Efficiency and User State Estimation Accuracy in Mobile.
Presented by Tao HUANG Lingzhi XU. Context Mobile devices need exploit variety of connectivity options as they travel. Operating systems manage wireless.
SCIENCE INQUIRY SC.8.N.1 Vocabulary
VPN Wireless Security at Penn State Rich Cropp Senior Systems Engineer Information Technology Services The Pennsylvania State University © All rights.
By Ravi Shankar Dubasi Sivani Kavuri A Popularity-Based Prediction Model for Web Prefetching.
BreadCrumbs: Forecasting Mobile Connectivity Presented by Hao He Slides adapted from Dhruv Kshatriya Anthony J. Nicholson and Brian D. Noble.
VoIP Packets In the Air and Over the Wire J. Scott Haugdahl CTO
Predicting and Bypassing End-to-End Internet Service Degradation Anat Bremler-BarrEdith CohenHaim KaplanYishay Mansour Tel-Aviv UniversityAT&T Labs Tel-Aviv.
1 On Failure Recoverability of Client-Server Applications in Mobile Wireless Environments Ing-Ray Chen, Baoshan Gu, Sapna E. George and Sheng- Tzong Cheng.
Unwanted Link Layer Traffic in Large IEEE Wireless Network By Naga V K Akkineni.
An Analysis of WoW Players’ Game Hours Matt Ross, Christian Ebinger, Anthony Morgan.
Wei Gao1 and Qinghua Li2 1The University of Tennessee, Knoxville
Y. Yuan and M. Raubal1 Investigating the distribution of human activity space from mobile phone usage Yihong Yuan 1,2 and Martin Raubal 1 1 Institute.
Wireless Trace Analysis Suyong Lee and Renata Aryanti Advisor: Prof. Suman Banerjee With assistance of : Vladimir Brik and Michael Blodget Fall 2007.
Patterns of Event Causality Suggest More Effective Corrective Actions Abstract: The Occurrence Reporting and Processing System (ORPS) has used a consistent.
On Exploiting Transient Contact Patterns for Data Forwarding in Delay Tolerant Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering.
1 Challenges in Scaling E-Business Sites  Menascé and Almeida. All Rights Reserved. Daniel A. Menascé Department of Computer Science George Mason.
Changing the Dynamics of Network Analysis J. Scott Haugdahl CTO, WildPackets, Inc.
Characterising the Use of a Campus Wireless Network 徐 志 賢 Paper From: D. Schwab and R.B. Bunt, "Characterising the Use of a Campus Wireless Network", Proc.
MODES-650 Advanced System Simulation Presented by Olgun Karademirci VERIFICATION AND VALIDATION OF SIMULATION MODELS.
Chapter 10 Verification and Validation of Simulation Models
The Changing Usage of a Mature Campus-wide Wireless Network CS525m – Mobile and Ubiquitous Computing Andrew Stone.
Wong, Gardner, Krieger, Litt (2006) Zack Dvey-Aharon, March 2008.
Science Process Skills Vocabulary 8/17/15. Predicting Forming an idea of an expected result. Based on inferences.
ApproxHadoop Bringing Approximations to MapReduce Frameworks
Modeling Web Quality-of-Experience on Cellular Networks
Predicting the Location and Time of Mobile Phone Users by Using Sequential Pattern Mining Techniques Mert Özer, Ilkcan Keles, Ismail Hakki Toroslu, Pinar.
Security in Wireless Networks Mike Swift CSE b Summer 2003.
Prediction-based Handoff in Heterogeneous Networks Bill Phillips 09 March 2007.
Wireless Cache Invalidation Schemes with Link Adaptation and Downlink Traffic Presented by Ying Jin.
Measurement and Modelling of the Temporal Dependence in Packet loss Maya Yajnik, Sue Moon, Jim Kurose, Don Towsley Department of Computer Science University.
Science Process Skills Vocabulary 8/16/04. Predicting Forming an idea of an expected result. Based on inferences.
Services Distribution Services (for APs) – Association – mobile stations connect themselves to base stations – Reassociation – a station may change.
Location Awareness Lancaster Keith Mitchell Computing Department Paul Astle Information Systems Services (ISS)
Analysis and prediction of QoE for video streaming using empirical measurements Funded by Forthnet, the GSRT with a Research Excellence grant, and by a.
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
WISECURE Exam CCNP Wireless WISECURE Exam
Purdue University, Georgia Institute of Technology, AT&T Labs Research
8th grade science Scientific Method.
Scientific Method Section 1.1.
Adv. Wireless Comm. Systems - Cellular Networks -
Chapter 10 Verification and Validation of Simulation Models
Authors Bo Sun, Fei Yu, Kui Wu, Yang Xiao, and Victor C. M. Leung.
Roaming Interval Measurements
Experimental Design: The Scientific Method.
Foundations for Physics
Presentation transcript:

Wireless Trace Analysis

Project Goals Summary of project goals: First goal: analyze wireless access patterns Second goal: implement Markov predictor and analyze “handoff” between Access Points (AP)

First Goal in Detail Analyze wireless access patterns based on several parameters such as: mobility, session and visit durations. Wireless access pattern will be extracted from wireless traces We plan to use traces at

First Goal in Detail Syslog events: Authenticated, Associated, Reassociated, Disassociated, Deauthenticated We use the notion of session and visit durations A visit represents continuous roaming A session consists of a sequence of visits w/o disconnections between them

First Goal in Detail We show that mobility affects both session and visit durations We define stationary and mobile visits/sessions Stationary – visit only one AP Mobile – visit more than one AP (in different buildings)

First Goal in Detail Methodology Parser reads trace (consists of syslog messages) and maintains a state array for each client, where state can be: 1.unauthenticated, unassociated 2. authenticated, unassociated 3. authenticated, associated

First Goal in Detail Methodology Based on state array and access point (AP) recorded in syslog data, we determine for each user how many sessions were observed, how long they were, whether they were stationary or mobile.

First Goal in Detail Hypothesis As mobility increases, visit durations decrease, while session durations increase Study other metrics like hourly and weekly transfers (if time permits).

Second Goal in Detail Problem: track and predict the location of mobile devices as they roam or handoff from one AP to another Review existing predictors: Markov predictor, LZ predictor, PPM predictor and compare their performance Implement Markov predictor and verify the performance

Second Goal in detail Methodology Correlate Markov predictor accuracy with entropy (all traces) Correlate Markov predictor accuracy with trace length Time prediction using Markov predictor Duration prediction using Markov predictor

Second Goal in detail Methodology Improve call drop rate with training data Improve block rate degradation with training data Make a tradeoff between drop rate and block rate

Second Goal in detail Hypothesis Higher entropy results in lower accuracy The ratio of correct prediction increased rapidly for short traces, then increases slightly for long traces Large intervals improves time predict accuracy but degrade the precision Bigger interval led to higher duration predict accuracy

Second Goal in detail Hypothesis Base DR / Reserved DR ~ 5% The improvement in drop rate is correlated to the worsening in block rate in some predictors