ABSTRACT
The wide-scale deployment of IEEE 802.11 wireless networks has generated significant challenges for Information Technology (IT) departments in corporations. Users frequently complain about connectivity and performance problems, and network administrators are expected to diagnose these problems while managing corporate security and coverage. Their task is particularly difficult due to the unreliable nature of the wireless medium and a lack of intelligent diagnostic tools for determining the cause of these problems.This paper presents an architecture for detecting and diagnosing faults in IEEE 802.11 infrastructure wireless networks. To the best of our knowledge, ours is the first paper to address fault diagnostic issues for these networks. As part of our architecture, we propose and evaluate a novel technique called Client Conduit, which enables boot-strapping and fault diagnosis of disconnected clients. We describe techniques for analyzing performance problems faced in a wireless LAN deployment. We also present an approach for detecting unauthorized access points. We have built a prototype of our fault diagnostic architecture on the Windows operating system using off-the-shelf IEEE 802.11 cards. The initial results show that our mechanisms are effective; furthermore, they impose low overheads when clients are not experiencing problems.
- B. Aboba and D. Simon. PPP EAP TLS Authentication Protocol. In RFC 2716, October 1999.]] Google ScholarDigital Library
- AirDefense. Wireless LAN Security. http://airdefense.net.]]Google Scholar
- AirMagnet. AirMagnet Distributed System. http://airmagnet.com.]]Google Scholar
- AirWave. AirWave Management Platform. http://airwave.com.]]Google Scholar
- M. Allman, W. Eddy, and S. Ostermann. Estimating Loss Rates With TCP. In ACM Perf. Evaluation Review 31(3), Dec 2003.]] Google ScholarDigital Library
- Atheros Communications. http://www.atheros.com.]]Google Scholar
- B. Awerbuch, D. Holmer, and H. Rubens. Provably Secure Competitive Routing against Proactive Byzantine Adversaries via Reinforcement Learning. In JHU Tech Report Version 1, May 2003.]]Google Scholar
- P. Bahl and V. N. Padmanabhan. RADAR: An Inbuilding RF-based User Location and Tracking System. In Proc. of IEEE INFOCOM, Tel-Aviv, Israel, March 2000.]]Google ScholarCross Ref
- P. Barford and M. Crovella. Critical Path Analysis of TCP Transactions. In Proc. of ACM SIGCOMM, Stockholm, Sweden, Aug 2000.]] Google ScholarDigital Library
- J. Bellardo and S. Savage. Measuring Packet Reordering. In Proc. of ACM Internet Measurement Workshop, Marseille France, Nov 2002.]] Google ScholarDigital Library
- D. Berry and G. Breeze. Microsoft IT division. Private Communication, 2004.]]Google Scholar
- Bluetooth SIG. Location Working Group. http://bluetooth.org.]]Google Scholar
- S. Buchegger and J. Le Boudec. The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-Hoc Networks. In Proc. of WiOpt, France, March 2003.]]Google Scholar
- R. Chandra, P. Bahl, and P. Bahl. MultiNet: Connecting to Multiple IEEE 802.11 Networks Using a Single Wireless Card. In Proc. of IEEE INFOCOM, Hong Kong, Mar 2004.]]Google ScholarCross Ref
- Cisco. CiscoWorks Wireless LAN Solution Engine. http://cisco.com.]]Google Scholar
- Computer Associates. Unicenter Solutions: Enabling a Successful Wireless Enterprise. http://www.ca.com.]]Google Scholar
- Ethereal: A Network Protocol Analyzer. http://ethereal.com.]]Google Scholar
- S. Floyd, M. Handley, J. Padhye, and J. Widmer. Equation-Based Congestion Control for Unicast Applications. In Proc. of ACM SIGCOMM, Stockholm, Sweden, Aug 2000.]] Google ScholarDigital Library
- J. D. Foley, A. van Dam, S. K. Feiner, and J. F. Hughes. Computer Graphics Principles and Practice (2nd Edition). Addison Wesley, 1990.]] Google ScholarDigital Library
- IBM Research. Wireless Security Auditor (WSA). http://www.research.ibm.com/gsal/wsa.]]Google Scholar
- IEEE Computer Society. IEEE 802.1x-2001 IEEE Standards for Local and Metropolitan Area Networks: Port-Based Network Access Control, 1999.]]Google Scholar
- IEEE Computer Society. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE Standard 802.11, 1999.]]Google Scholar
- A. Ladd, K. Bekris, A. Rudys, G. Marceau, L. Kavraki, and D. Wallach. Robotics-Based Location Sensing using Wireless Ethernet. In Proc. of ACM MobiCom, Atlanta, GA, Sept 2002.]] Google ScholarDigital Library
- R. Mahajan, N. Spring, D. Wetherall, and T. Anderson. User-level Internet Path Diagnosis. In Proc. of ACM SOSP, Bolton Landing, NY, October 2003.]] Google ScholarDigital Library
- S. Marti, T. Giuli, K. Lai, and M. Baker. Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In Proc. of ACM MobiCom, Boston, MA, August 2000.]] Google ScholarDigital Library
- Microsoft Corp. Native 802.11 Framework for IEEE 802.11 Networks. http://microsoft.com.]]Google Scholar
- B. Neuman and T. Tso. An Authentication Service for Computer Networks. In IEEE Communications, Karlsruhe, Germany, Sept 1996.]] Google ScholarDigital Library
- J. Padhye, V. Firoiu, D. Towsley, and J. Kurose. Modeling TCP Throughput: a Simple Model and its Empirical Validation. In Proc. of ACM SIGCOMM, Vancouver, BC, September 1998.]] Google ScholarDigital Library
- N. B. Priyantha, A. Chakraborty, and H. Balakrishnan. The Cricket Location-Support System. In Proc. of ACM MobiCom, Boston, MA, August 2000.]] Google ScholarDigital Library
- L. Qiu, P. Bahl, A. Rao, and L. Zhou. Fault Detection, Isolation, and Diagnosis in Multihop Wireless Networks. Technical Report MSR-TR-2004-11, Microsoft Research, Redmond, WA, Dec 2003.]]Google Scholar
- M. Raya, J. P. Hubaux, and I. Aad. DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots. In Proc. of MobiSys, Boston, MA, June 2004.]] Google ScholarDigital Library
- C. Rigney, A. Rubens, W. Simpson, and S. Willens. Remote Authentication Dial In User Service (RADIUS). In RFC 2138, IETF, April 1997.]] Google ScholarDigital Library
- H. Schulzrinne, S. Casner, R. Frederick, and V. Jacobson. RTP: A Transport Protocol for Real-Time Applications. In RFC 1889, IETF, Jan. 1996.]]Google Scholar
- R. Stevens. TCP/IP Illustrated (Vol. 1): The Protocols. Addison Wesley, 1994.]] Google ScholarDigital Library
- Symbol Technolgies Inc. SpectrumSoft: Wireless Network Management System. http://www.symbol.com.]]Google Scholar
- R. Want, A. Hopper, V. Falcao, and J. Gibbons. The Active Badge Location System. ACM Transactions on Information Systems, 10(1), January 1992.]] Google ScholarDigital Library
- Wibhu Technologies Inc. SpectraMon. http://www.wibhu.com.]]Google Scholar
- WildPackets Inc. Airopeek Wireless LAN Analyzer. http://www.wildpackets.com.]]Google Scholar
- WinDump: tcpdump for Windows. http://windump.polito.it.]]Google Scholar
- Y. Zhang, L. Breslau, V. Paxson, and S. Shenker. On the Characteristics and Origins of Internet Flow Rates. In Proc. of ACM SIGCOMM, Pitsburgh, PA, August 2002.]] Google ScholarDigital Library
- Y. Zhang, N. Duffield, V. Paxson, and S. Shenker. On the Constancy of Internet Path Properties. In Proc. of ACM Internet Measurement Workshop, San Francisco, CA, Nov 2001.]] Google ScholarDigital Library
Index Terms
- Architecture and techniques for diagnosing faults in IEEE 802.11 infrastructure networks
Recommendations
Relay-volunteered multi-rate cooperative MAC protocol for IEEE 802.11 WLANs
In IEEE 802.11, the rate of a station (STA) is dynamically determined by link adaptation. Low-rate STAs tend to hog more channel time than high-rate STAs due to fair characteristics of carrier sense multiple access/collision avoidance, leading to ...
On avoiding RTS collisions for IEEE 802.11-based wireless ad hoc networks
The paper proposes an RCA (RTS collision avoidance) MAC protocol to reduce RTS collisions for IEEE 802.11-based mobile ad hoc networks (MANETs). RTS/CTS exchanging is used for the resolution of the hidden terminal problem. However, the paper shows that, ...
Inter-AP coordination for fair throughput in infrastructure-based IEEE 802.11 mesh networks
IWCMC '06: Proceedings of the 2006 international conference on Wireless communications and mobile computingThis paper studies throughput fairness among different basic service sets (BSSs) in infrastructure-based IEEE 802.11 mesh networks, where inter-BSS interference is unavoidable because of the difficulty in frequency and coverage planning and the limited ...
Comments