Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1159913.1159923acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
Article
Free access

Analyzing the MAC-level behavior of wireless networks in the wild

Published: 11 August 2006 Publication History

Abstract

We present Wit, a non-intrusive tool that builds on passive monitoring to analyze the detailed MAC-level behavior of operational wireless networks. Wit uses three processing steps to construct an enhanced trace of system activity. First, a robust merging procedure combines the necessarily incomplete views from multiple, independent monitors into a single, more complete trace of wireless activity. Next, a novel inference engine based on formal language methods reconstructs packets that were not captured by any monitor and determines whether each packet was received by its destination. Finally, Wit derives network performance measures from this enhanced trace; we show how to estimate the number of stations competing for the medium. We assess Wit with a mix of real traces and simulation tests. We find that merging and inference both significantly enhance the originally captured trace. We apply Wit to multi-monitor traces from a live network to show how it facilitates 802.11 MAC analyses that would otherwise be difficult or rely on less accurate heuristics.

References

[1]
IEEE Std. 802.11i - Amendment 6: Medium access control security enhancements, 2004.
[2]
D. Aguayo, J. Bicket, S. Biswas, G. Judd, and R. Morris. Link-level measurements from an 802.11b mesh network. In SIGCOMM, 2004.
[3]
A. Akella, J. Pang, B. Maggs, S. Seshan, and A. Shaikh. A comparison of overlay routing and multihoming route control. In SIGCOMM, 2004.
[4]
A. Balachandran, G. M. Voelker, P. Bahl, and P. V. Rangan. Characterizing user behavior and network performance in a public wireless LAN. In SIGMETRICS, 2002.
[5]
M. Balazinska and P. Castro. Characterizing mobility and network usage in a corporate wireless local-area network. In MobiSys, 2003.
[6]
Y.-C. Cheng, J. Bellardo, P. Benko, A. C. Snoeren, G. M. Voelker, and S. Savage. Jigsaw: Solving the puzzle of enterprise 802. 11 analysis. In SIGCOMM, 2006.
[7]
F. Chinchilla, M. Lindsey, and M. Papadopouli. Analysis of wireless information locality and association patterns in a campus. In INFOCOM, 2004.
[8]
T. Henderson, D. Kotz, and I. Abyzov. The changing usage of a mature campus-wide wireless network. In MobiCom, 2004.
[9]
M. Heusse, F. Rousseau, R. Guillier, and A. Duda. Idle sense: An optimal access method for high throughput and fairness in rate diverse wireless LANs. In SIGCOMM, 2005.
[10]
K. Jamieson, B. Hull, A. Miu, and H. Balakrishnan. Understanding the real-world performance of carrier sense. In workshop on Experimental Approaches to Wireless Network Design and Analysis (E-WIND), 2005.
[11]
A. Jardosh, K. Ramachandran, K. Almeroth, and E. Belding-Royer. Understanding congestion in IEEE 802.11b wireless networks. In IMC, 2005.
[12]
D. Kotz, C. Newport, R. S. Gray, J. Liu, Y. Yuan, and C. Elliott. Experimental evaluation of wireless simulation assumptions. In symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM), 2004.
[13]
C. Labovitz, A. Ahuja, A. Bose, and F. Jahanian. An experimental study of delayed Internet routing convergence. In SIGCOMM, 2000.
[14]
D. Lee, A. N. Netravali, K. K. Sabnani, B. Sugla, and A. John. Passive testing and applications to network management. In ICNP, 1997.
[15]
S. Mangold, Z. Zhong, G. R. Hiertz, and B. Walke. IEEE 802.11e/802.11k wireless LAN: Spectrum awareness for distributed resource sharing. Wireless Communications and Mobile Computing, 4(8), 2004.
[16]
A. Miu, H. Balakrishnan, and C. E. Koksal. Improving loss resilience with multi-radio diversity in wireless networks. In MobiCom, 2005.
[17]
V. Paxson. Automated packet trace analysis of TCP implementations. In SIGCOMM, 1997.
[18]
V. Paxson. End-to-end routing behavior in the Internet. In SIGCOMM, 1997.
[19]
Qualnet network simulator by Scalable Network Technologies. http://www.qualnet.com.
[20]
I. Ramani and S. Savage. Syncscan: Practical fast handoff for 802.11 infrastructure netwroks. In INFOCOM, 2005.
[21]
M. Rodrig, C. Reis, R. Mahajan, D. Wetherall, and J. Zahorjan. Measurement-based characterization of 802.11 in a hotspot setting. In workshop on Experimental Approaches to Wireless Network Design and Analysis (E-WIND), 2005.
[22]
S. Savage, A. Collins, E. Hoffman, J. Snell, and T. Anderson. The end-to-end effects of Internet path selection. In SIGCOMM, 1999.
[23]
D. Schwab and R. Bunt. Characterising the use of a campus wireless network. In INFOCOM, 2004.
[24]
N. Spring, R. Mahajan, and D. Wetherall. Measuring ISP topologies with Rocketfuel. In SIGCOMM, 2002.
[25]
G. Tan and J. Guttag. The 802. 11 MAC protocol leads to inefficient equilibria. In INFOCOM, 2005.
[26]
D. Tang and M. Baker. Analysis of a local-area wireless network. In MobiCom, 2000.
[27]
J. Yeo, M. Youssef, and A. Agrawala. A framework for wireless LAN monitoring and its applications. In workshop on Wireless Security (WiSe), 2004.
[28]
Y. Zhang, L. Breslau, V. Paxson, and S. Shenker. On the characteristics and origins of Internet flow rates. In SIGCOMM, 2002.
[29]
J. Zhao and R. Govindan. Understanding packet delivery performance in dense wireless sensor networks. In SenSys, 2003.

Cited By

View all

Index Terms

  1. Analyzing the MAC-level behavior of wireless networks in the wild

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      SIGCOMM '06: Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
      September 2006
      458 pages
      ISBN:1595933085
      DOI:10.1145/1159913
      • cover image ACM SIGCOMM Computer Communication Review
        ACM SIGCOMM Computer Communication Review  Volume 36, Issue 4
        Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
        October 2006
        445 pages
        ISSN:0146-4833
        DOI:10.1145/1151659
        Issue’s Table of Contents
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 11 August 2006

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. 802.11 MAC
      2. measurement tool
      3. passive monitoring

      Qualifiers

      • Article

      Conference

      SIGCOMM06
      Sponsor:
      SIGCOMM06: ACM SIGCOMM 2006 Conference
      September 11 - 15, 2006
      Pisa, Italy

      Acceptance Rates

      Overall Acceptance Rate 462 of 3,389 submissions, 14%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)36
      • Downloads (Last 6 weeks)3
      Reflects downloads up to 16 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)Unity is strengthAd Hoc Networks10.1016/j.adhoc.2023.103287151:COnline publication date: 1-Dec-2023
      • (2022)Assessing the Completeness of Passive Wi-Fi Traffic Capture2022 International Wireless Communications and Mobile Computing (IWCMC)10.1109/IWCMC55113.2022.9824970(961-966)Online publication date: 30-May-2022
      • (2021)Sniffing Only Control Packets: A Lightweight Client-Side WiFi Traffic Characterization SolutionIEEE Internet of Things Journal10.1109/JIOT.2020.30416718:8(6536-6548)Online publication date: 15-Apr-2021
      • (2021)Minimax Bounds for Blind Network Inference2021 IEEE International Symposium on Information Theory (ISIT)10.1109/ISIT45174.2021.9518065(1823-1828)Online publication date: 12-Jul-2021
      • (2020)Movable Platform-Based Topology Detection for a Geographic Routing Wireless Sensor NetworkSensors10.3390/s2013372620:13(3726)Online publication date: 3-Jul-2020
      • (2020)WiNetSense: Sensing and Analysis Model for Large-scale Wireless NetworksIEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)10.1109/INFOCOMWKSHPS50562.2020.9162871(787-792)Online publication date: Jul-2020
      • (2020)A Passive Client Side Control Packet-based WiFi Traffic Characterization MechanismICC 2020 - 2020 IEEE International Conference on Communications (ICC)10.1109/ICC40277.2020.9148619(1-7)Online publication date: Jun-2020
      • (2019)Anomaly Detection and Modeling in 802.11 Wireless NetworksJournal of Network and Systems Management10.1007/s10922-018-9455-227:1(3-38)Online publication date: 1-Jan-2019
      • (2018)Witals: AP-Centric Health Diagnosis of WiFi NetworksIEEE Transactions on Mobile Computing10.1109/TMC.2017.273915217:4(975-989)Online publication date: 1-Apr-2018
      • (2018)Network Measurement in Multihop Wireless Networks with Lossy and Correlated LinksIEEE INFOCOM 2018 - IEEE Conference on Computer Communications10.1109/INFOCOM.2018.8485835(1340-1348)Online publication date: 16-Apr-2018
      • Show More Cited By

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media