Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1023720.1023724acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
Article

Architecture and techniques for diagnosing faults in IEEE 802.11 infrastructure networks

Published: 26 September 2004 Publication History

Abstract

The wide-scale deployment of IEEE 802.11 wireless networks has generated significant challenges for Information Technology (IT) departments in corporations. Users frequently complain about connectivity and performance problems, and network administrators are expected to diagnose these problems while managing corporate security and coverage. Their task is particularly difficult due to the unreliable nature of the wireless medium and a lack of intelligent diagnostic tools for determining the cause of these problems.This paper presents an architecture for detecting and diagnosing faults in IEEE 802.11 infrastructure wireless networks. To the best of our knowledge, ours is the first paper to address fault diagnostic issues for these networks. As part of our architecture, we propose and evaluate a novel technique called Client Conduit, which enables boot-strapping and fault diagnosis of disconnected clients. We describe techniques for analyzing performance problems faced in a wireless LAN deployment. We also present an approach for detecting unauthorized access points. We have built a prototype of our fault diagnostic architecture on the Windows operating system using off-the-shelf IEEE 802.11 cards. The initial results show that our mechanisms are effective; furthermore, they impose low overheads when clients are not experiencing problems.

References

[1]
B. Aboba and D. Simon. PPP EAP TLS Authentication Protocol. In RFC 2716, October 1999.]]
[2]
AirDefense. Wireless LAN Security. http://airdefense.net.]]
[3]
AirMagnet. AirMagnet Distributed System. http://airmagnet.com.]]
[4]
AirWave. AirWave Management Platform. http://airwave.com.]]
[5]
M. Allman, W. Eddy, and S. Ostermann. Estimating Loss Rates With TCP. In ACM Perf. Evaluation Review 31(3), Dec 2003.]]
[6]
Atheros Communications. http://www.atheros.com.]]
[7]
B. Awerbuch, D. Holmer, and H. Rubens. Provably Secure Competitive Routing against Proactive Byzantine Adversaries via Reinforcement Learning. In JHU Tech Report Version 1, May 2003.]]
[8]
P. Bahl and V. N. Padmanabhan. RADAR: An Inbuilding RF-based User Location and Tracking System. In Proc. of IEEE INFOCOM, Tel-Aviv, Israel, March 2000.]]
[9]
P. Barford and M. Crovella. Critical Path Analysis of TCP Transactions. In Proc. of ACM SIGCOMM, Stockholm, Sweden, Aug 2000.]]
[10]
J. Bellardo and S. Savage. Measuring Packet Reordering. In Proc. of ACM Internet Measurement Workshop, Marseille France, Nov 2002.]]
[11]
D. Berry and G. Breeze. Microsoft IT division. Private Communication, 2004.]]
[12]
Bluetooth SIG. Location Working Group. http://bluetooth.org.]]
[13]
S. Buchegger and J. Le Boudec. The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-Hoc Networks. In Proc. of WiOpt, France, March 2003.]]
[14]
R. Chandra, P. Bahl, and P. Bahl. MultiNet: Connecting to Multiple IEEE 802.11 Networks Using a Single Wireless Card. In Proc. of IEEE INFOCOM, Hong Kong, Mar 2004.]]
[15]
Cisco. CiscoWorks Wireless LAN Solution Engine. http://cisco.com.]]
[16]
Computer Associates. Unicenter Solutions: Enabling a Successful Wireless Enterprise. http://www.ca.com.]]
[17]
Ethereal: A Network Protocol Analyzer. http://ethereal.com.]]
[18]
S. Floyd, M. Handley, J. Padhye, and J. Widmer. Equation-Based Congestion Control for Unicast Applications. In Proc. of ACM SIGCOMM, Stockholm, Sweden, Aug 2000.]]
[19]
J. D. Foley, A. van Dam, S. K. Feiner, and J. F. Hughes. Computer Graphics Principles and Practice (2nd Edition). Addison Wesley, 1990.]]
[20]
IBM Research. Wireless Security Auditor (WSA). http://www.research.ibm.com/gsal/wsa.]]
[21]
IEEE Computer Society. IEEE 802.1x-2001 IEEE Standards for Local and Metropolitan Area Networks: Port-Based Network Access Control, 1999.]]
[22]
IEEE Computer Society. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE Standard 802.11, 1999.]]
[23]
A. Ladd, K. Bekris, A. Rudys, G. Marceau, L. Kavraki, and D. Wallach. Robotics-Based Location Sensing using Wireless Ethernet. In Proc. of ACM MobiCom, Atlanta, GA, Sept 2002.]]
[24]
R. Mahajan, N. Spring, D. Wetherall, and T. Anderson. User-level Internet Path Diagnosis. In Proc. of ACM SOSP, Bolton Landing, NY, October 2003.]]
[25]
S. Marti, T. Giuli, K. Lai, and M. Baker. Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In Proc. of ACM MobiCom, Boston, MA, August 2000.]]
[26]
Microsoft Corp. Native 802.11 Framework for IEEE 802.11 Networks. http://microsoft.com.]]
[27]
B. Neuman and T. Tso. An Authentication Service for Computer Networks. In IEEE Communications, Karlsruhe, Germany, Sept 1996.]]
[28]
J. Padhye, V. Firoiu, D. Towsley, and J. Kurose. Modeling TCP Throughput: a Simple Model and its Empirical Validation. In Proc. of ACM SIGCOMM, Vancouver, BC, September 1998.]]
[29]
N. B. Priyantha, A. Chakraborty, and H. Balakrishnan. The Cricket Location-Support System. In Proc. of ACM MobiCom, Boston, MA, August 2000.]]
[30]
L. Qiu, P. Bahl, A. Rao, and L. Zhou. Fault Detection, Isolation, and Diagnosis in Multihop Wireless Networks. Technical Report MSR-TR-2004-11, Microsoft Research, Redmond, WA, Dec 2003.]]
[31]
M. Raya, J. P. Hubaux, and I. Aad. DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots. In Proc. of MobiSys, Boston, MA, June 2004.]]
[32]
C. Rigney, A. Rubens, W. Simpson, and S. Willens. Remote Authentication Dial In User Service (RADIUS). In RFC 2138, IETF, April 1997.]]
[33]
H. Schulzrinne, S. Casner, R. Frederick, and V. Jacobson. RTP: A Transport Protocol for Real-Time Applications. In RFC 1889, IETF, Jan. 1996.]]
[34]
R. Stevens. TCP/IP Illustrated (Vol. 1): The Protocols. Addison Wesley, 1994.]]
[35]
Symbol Technolgies Inc. SpectrumSoft: Wireless Network Management System. http://www.symbol.com.]]
[36]
R. Want, A. Hopper, V. Falcao, and J. Gibbons. The Active Badge Location System. ACM Transactions on Information Systems, 10(1), January 1992.]]
[37]
Wibhu Technologies Inc. SpectraMon. http://www.wibhu.com.]]
[38]
WildPackets Inc. Airopeek Wireless LAN Analyzer. http://www.wildpackets.com.]]
[39]
WinDump: tcpdump for Windows. http://windump.polito.it.]]
[40]
Y. Zhang, L. Breslau, V. Paxson, and S. Shenker. On the Characteristics and Origins of Internet Flow Rates. In Proc. of ACM SIGCOMM, Pitsburgh, PA, August 2002.]]
[41]
Y. Zhang, N. Duffield, V. Paxson, and S. Shenker. On the Constancy of Internet Path Properties. In Proc. of ACM Internet Measurement Workshop, San Francisco, CA, Nov 2001.]]

Cited By

View all
  • (2021)AN ATTACK SCENARIO USING A ROGUE ACCESS POINT IN IEEE 802.11 NETWORKSCybersecurity: Education, Science, Technique10.28925/2663-4023.2021.11.1441543:11(144-154)Online publication date: 2021
  • (2020)A Pattern-Language for Self-Healing Internet-of-Things SystemsProceedings of the European Conference on Pattern Languages of Programs 202010.1145/3424771.3424804(1-17)Online publication date: 1-Jul-2020
  • (2020)Catch Me If You Can: Rogue Access Point Detection Using Intentional Channel InterferenceIEEE Transactions on Mobile Computing10.1109/TMC.2019.290305219:5(1056-1071)Online publication date: 1-May-2020
  • Show More Cited By

Index Terms

  1. Architecture and techniques for diagnosing faults in IEEE 802.11 infrastructure networks

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    MobiCom '04: Proceedings of the 10th annual international conference on Mobile computing and networking
    September 2004
    384 pages
    ISBN:1581138687
    DOI:10.1145/1023720
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 26 September 2004

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. IEEE 802.11
    2. disconnected clients
    3. fault detection
    4. fault diagnosis
    5. infrastructure wireless networks
    6. rogue APs

    Qualifiers

    • Article

    Conference

    MobiCom04
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 440 of 2,972 submissions, 15%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)7
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 15 Oct 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2021)AN ATTACK SCENARIO USING A ROGUE ACCESS POINT IN IEEE 802.11 NETWORKSCybersecurity: Education, Science, Technique10.28925/2663-4023.2021.11.1441543:11(144-154)Online publication date: 2021
    • (2020)A Pattern-Language for Self-Healing Internet-of-Things SystemsProceedings of the European Conference on Pattern Languages of Programs 202010.1145/3424771.3424804(1-17)Online publication date: 1-Jul-2020
    • (2020)Catch Me If You Can: Rogue Access Point Detection Using Intentional Channel InterferenceIEEE Transactions on Mobile Computing10.1109/TMC.2019.290305219:5(1056-1071)Online publication date: 1-May-2020
    • (2019)Anomaly Detection and Modeling in 802.11 Wireless NetworksJournal of Network and Systems Management10.1007/s10922-018-9455-227:1(3-38)Online publication date: 1-Jan-2019
    • (2018)Witals: AP-Centric Health Diagnosis of WiFi NetworksIEEE Transactions on Mobile Computing10.1109/TMC.2017.273915217:4(975-989)Online publication date: 1-Apr-2018
    • (2018)Locating Faults in MANET-Hosted Software SystemsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2016.259628415:3(452-465)Online publication date: 1-May-2018
    • (2017)The Performance Analysis of Honeypot Based Intrusion Detection System for Wireless NetworkInternational Journal of Wireless Information Networks10.1007/s10776-016-0330-324:1(14-26)Online publication date: 10-Jan-2017
    • (2016)Forensic Analysis of Packet Losses in Wireless NetworksIEEE/ACM Transactions on Networking10.1109/TNET.2015.244855024:4(1975-1988)Online publication date: 1-Aug-2016
    • (2016)Not you too? Distilling local contexts of poor cellular network performance through participatory sensingNOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium10.1109/NOMS.2016.7502836(392-400)Online publication date: Apr-2016
    • (2016)Automatic failure diagnosis for Wireless LAN systems based on distribution of responses from STAs2016 Eighth International Conference on Ubiquitous and Future Networks (ICUFN)10.1109/ICUFN.2016.7537147(796-800)Online publication date: Jul-2016
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media