skip to main content
10.1145/1023720.1023724acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
Article

Architecture and techniques for diagnosing faults in IEEE 802.11 infrastructure networks

Published:26 September 2004Publication History

ABSTRACT

The wide-scale deployment of IEEE 802.11 wireless networks has generated significant challenges for Information Technology (IT) departments in corporations. Users frequently complain about connectivity and performance problems, and network administrators are expected to diagnose these problems while managing corporate security and coverage. Their task is particularly difficult due to the unreliable nature of the wireless medium and a lack of intelligent diagnostic tools for determining the cause of these problems.This paper presents an architecture for detecting and diagnosing faults in IEEE 802.11 infrastructure wireless networks. To the best of our knowledge, ours is the first paper to address fault diagnostic issues for these networks. As part of our architecture, we propose and evaluate a novel technique called Client Conduit, which enables boot-strapping and fault diagnosis of disconnected clients. We describe techniques for analyzing performance problems faced in a wireless LAN deployment. We also present an approach for detecting unauthorized access points. We have built a prototype of our fault diagnostic architecture on the Windows operating system using off-the-shelf IEEE 802.11 cards. The initial results show that our mechanisms are effective; furthermore, they impose low overheads when clients are not experiencing problems.

References

  1. B. Aboba and D. Simon. PPP EAP TLS Authentication Protocol. In RFC 2716, October 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. AirDefense. Wireless LAN Security. http://airdefense.net.]]Google ScholarGoogle Scholar
  3. AirMagnet. AirMagnet Distributed System. http://airmagnet.com.]]Google ScholarGoogle Scholar
  4. AirWave. AirWave Management Platform. http://airwave.com.]]Google ScholarGoogle Scholar
  5. M. Allman, W. Eddy, and S. Ostermann. Estimating Loss Rates With TCP. In ACM Perf. Evaluation Review 31(3), Dec 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Atheros Communications. http://www.atheros.com.]]Google ScholarGoogle Scholar
  7. B. Awerbuch, D. Holmer, and H. Rubens. Provably Secure Competitive Routing against Proactive Byzantine Adversaries via Reinforcement Learning. In JHU Tech Report Version 1, May 2003.]]Google ScholarGoogle Scholar
  8. P. Bahl and V. N. Padmanabhan. RADAR: An Inbuilding RF-based User Location and Tracking System. In Proc. of IEEE INFOCOM, Tel-Aviv, Israel, March 2000.]]Google ScholarGoogle ScholarCross RefCross Ref
  9. P. Barford and M. Crovella. Critical Path Analysis of TCP Transactions. In Proc. of ACM SIGCOMM, Stockholm, Sweden, Aug 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. Bellardo and S. Savage. Measuring Packet Reordering. In Proc. of ACM Internet Measurement Workshop, Marseille France, Nov 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. D. Berry and G. Breeze. Microsoft IT division. Private Communication, 2004.]]Google ScholarGoogle Scholar
  12. Bluetooth SIG. Location Working Group. http://bluetooth.org.]]Google ScholarGoogle Scholar
  13. S. Buchegger and J. Le Boudec. The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-Hoc Networks. In Proc. of WiOpt, France, March 2003.]]Google ScholarGoogle Scholar
  14. R. Chandra, P. Bahl, and P. Bahl. MultiNet: Connecting to Multiple IEEE 802.11 Networks Using a Single Wireless Card. In Proc. of IEEE INFOCOM, Hong Kong, Mar 2004.]]Google ScholarGoogle ScholarCross RefCross Ref
  15. Cisco. CiscoWorks Wireless LAN Solution Engine. http://cisco.com.]]Google ScholarGoogle Scholar
  16. Computer Associates. Unicenter Solutions: Enabling a Successful Wireless Enterprise. http://www.ca.com.]]Google ScholarGoogle Scholar
  17. Ethereal: A Network Protocol Analyzer. http://ethereal.com.]]Google ScholarGoogle Scholar
  18. S. Floyd, M. Handley, J. Padhye, and J. Widmer. Equation-Based Congestion Control for Unicast Applications. In Proc. of ACM SIGCOMM, Stockholm, Sweden, Aug 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. J. D. Foley, A. van Dam, S. K. Feiner, and J. F. Hughes. Computer Graphics Principles and Practice (2nd Edition). Addison Wesley, 1990.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. IBM Research. Wireless Security Auditor (WSA). http://www.research.ibm.com/gsal/wsa.]]Google ScholarGoogle Scholar
  21. IEEE Computer Society. IEEE 802.1x-2001 IEEE Standards for Local and Metropolitan Area Networks: Port-Based Network Access Control, 1999.]]Google ScholarGoogle Scholar
  22. IEEE Computer Society. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE Standard 802.11, 1999.]]Google ScholarGoogle Scholar
  23. A. Ladd, K. Bekris, A. Rudys, G. Marceau, L. Kavraki, and D. Wallach. Robotics-Based Location Sensing using Wireless Ethernet. In Proc. of ACM MobiCom, Atlanta, GA, Sept 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. R. Mahajan, N. Spring, D. Wetherall, and T. Anderson. User-level Internet Path Diagnosis. In Proc. of ACM SOSP, Bolton Landing, NY, October 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. S. Marti, T. Giuli, K. Lai, and M. Baker. Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In Proc. of ACM MobiCom, Boston, MA, August 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Microsoft Corp. Native 802.11 Framework for IEEE 802.11 Networks. http://microsoft.com.]]Google ScholarGoogle Scholar
  27. B. Neuman and T. Tso. An Authentication Service for Computer Networks. In IEEE Communications, Karlsruhe, Germany, Sept 1996.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. J. Padhye, V. Firoiu, D. Towsley, and J. Kurose. Modeling TCP Throughput: a Simple Model and its Empirical Validation. In Proc. of ACM SIGCOMM, Vancouver, BC, September 1998.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. N. B. Priyantha, A. Chakraborty, and H. Balakrishnan. The Cricket Location-Support System. In Proc. of ACM MobiCom, Boston, MA, August 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. L. Qiu, P. Bahl, A. Rao, and L. Zhou. Fault Detection, Isolation, and Diagnosis in Multihop Wireless Networks. Technical Report MSR-TR-2004-11, Microsoft Research, Redmond, WA, Dec 2003.]]Google ScholarGoogle Scholar
  31. M. Raya, J. P. Hubaux, and I. Aad. DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots. In Proc. of MobiSys, Boston, MA, June 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. C. Rigney, A. Rubens, W. Simpson, and S. Willens. Remote Authentication Dial In User Service (RADIUS). In RFC 2138, IETF, April 1997.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. H. Schulzrinne, S. Casner, R. Frederick, and V. Jacobson. RTP: A Transport Protocol for Real-Time Applications. In RFC 1889, IETF, Jan. 1996.]]Google ScholarGoogle Scholar
  34. R. Stevens. TCP/IP Illustrated (Vol. 1): The Protocols. Addison Wesley, 1994.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Symbol Technolgies Inc. SpectrumSoft: Wireless Network Management System. http://www.symbol.com.]]Google ScholarGoogle Scholar
  36. R. Want, A. Hopper, V. Falcao, and J. Gibbons. The Active Badge Location System. ACM Transactions on Information Systems, 10(1), January 1992.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Wibhu Technologies Inc. SpectraMon. http://www.wibhu.com.]]Google ScholarGoogle Scholar
  38. WildPackets Inc. Airopeek Wireless LAN Analyzer. http://www.wildpackets.com.]]Google ScholarGoogle Scholar
  39. WinDump: tcpdump for Windows. http://windump.polito.it.]]Google ScholarGoogle Scholar
  40. Y. Zhang, L. Breslau, V. Paxson, and S. Shenker. On the Characteristics and Origins of Internet Flow Rates. In Proc. of ACM SIGCOMM, Pitsburgh, PA, August 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Y. Zhang, N. Duffield, V. Paxson, and S. Shenker. On the Constancy of Internet Path Properties. In Proc. of ACM Internet Measurement Workshop, San Francisco, CA, Nov 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Architecture and techniques for diagnosing faults in IEEE 802.11 infrastructure networks

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      MobiCom '04: Proceedings of the 10th annual international conference on Mobile computing and networking
      September 2004
      384 pages
      ISBN:1581138687
      DOI:10.1145/1023720

      Copyright © 2004 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 26 September 2004

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Acceptance Rates

      Overall Acceptance Rate440of2,972submissions,15%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader