11 Automating Cross-Layer Diagnosis of Enterprise 802.11 Wireless Networks Yu-Chung Cheng Mikhail Afanasyev Patrick Verkaik Jennifer Chiang Alex C. Snoeren.

Slides:



Advertisements
Similar presentations
The Transmission Control Protocol (TCP) carries most Internet traffic, so performance of the Internet depends to a great extent on how well TCP works.
Advertisements

IEEE INFOCOM 2004 MultiNet: Connecting to Multiple IEEE Networks Using a Single Wireless Card.
1 Improving TCP Performance over Mobile Networks HALA ELAARAG Stetson University Speaker : Aron ACM Computing Surveys 2002.
Improving TCP over Wireless by Selectively Protecting Packet Transmissions Carla F. Chiasserini Michele Garetto Michela Meo Dipartimento di Elettronica.
WiFox: Scaling WiFi Performance for Large Audience Environments Arpit Gupta, Jeongki Min and Injong Rhee NC State University.
 Implementation of physical and data link layer in software  Real-time access to network stack  Real-time traffic monitoring  Fine-grained control.
Madhavi W. SubbaraoWCTG - NIST Dynamic Power-Conscious Routing for Mobile Ad-Hoc Networks Madhavi W. Subbarao Wireless Communications Technology Group.
Chapter 14 Wireless Attacks, Intrusion Monitoring and Policy
Wireless Design for Voice Last Update Copyright 2011 Kenneth M. Chipps Ph.D.
1 Network Measurements of a Wireless Classroom Network Carey Williamson Nuha Kamaluddeen Department of Computer Science University of Calgary.
Emerging Technologies in Wireless LANs. Replacement for traditional Ethernet LANs Several Municipalities Portland, OR Philadelphia, PA San Francisco,
Terminal Bridge Extension Over Distributed Architecture MSc. Sami Saalasti.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
2008/6/51 Improving TCP-Friendly Rate Control in Wired and Wireless Networks By a Scheme Based on Wireless Signal Strength Il Mo Jung, Nicolaos B. Karayiannis,
11 Diagnosing and improving Wireless Networks Patrick Verkaik Mikhail Afanasyev Yuvraj Agarwal Yu-Chung Cheng Stefan Savage Alex C. Snoeren Geoffrey.
Network Access Management Trends in IT Applications for Management Prepared by: Ahmed Ibrahim S
Isolation of Wireless Ad hoc Medium Access Mechanisms under TCP Ken Tang,Mario Correa,Mario Gerla Computer Science Department,UCLA.
The War Between Mice and Elephants By Liang Guo (Graduate Student) Ibrahim Matta (Professor) Boston University ICNP’2001 Presented By Preeti Phadnis.
1. 2 Enterprise WLAN setting 2 Vivek Shrivastava Wireless controller Access Point Clients Internet NSDI 2011.
A victim-centric peer-assisted framework for monitoring and troubleshooting routing problems.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Jigsaw: Solving the Puzzle of Enterprise Analysis Yu-Chung Cheng John Bellardo, Peter Benko, Alex C. Snoeren, Geoff Voelker, Stefan Savage.
Maintaining and Updating Windows Server 2008
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Junxian Huang 1 Feng Qian 2 Yihua Guo 1 Yuanyuan Zhou 1 Qiang Xu 1 Z. Morley Mao 1 Subhabrata Sen 2 Oliver Spatscheck 2 1 University of Michigan 2 AT&T.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
TCP Behavior across Multihop Wireless Networks and the Wired Internet Kaixin Xu, Sang Bae, Mario Gerla, Sungwook Lee Computer Science Department University.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
Qi Alfred Chen University of Michigan
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
Adapted from: Computer Networking, Kurose/Ross 1DT066 Distributed Information Systems Chapter 6 Wireless, WiFi and mobility.
Lecture 1 Wireless Networks CPE 401/601 Computer Network Systems slides are modified from Jim Kurose & Keith Ross All material copyright J.F.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
Divert: Fine-grained Path Selection for Wireless LAN Allen Miu, Godfrey Tan, Hari Balakrishnan, John Apostolopoulos * MIT Computer Science and Artificial.
Unwanted Link Layer Traffic in Large IEEE Wireless Network By Naga V K Akkineni.
ISO Layer Model Lecture 9 October 16, The Need for Protocols Multiple hardware platforms need to have the ability to communicate. Writing communications.
9/19/20151 Automating Cross-Layer Diagnosis of Enterprise Wireless Networks Geoffrey M. Voelker Mikhail Afanasyev, John Bellardo, Peter Benko, Yu-Chung.
Ethernet. Problem In an Ethernet, suppose there are three stations very close to each other, A, B and C. Suppose at time 0, all of them have a frame to.
2006/12/04NTU/nslab1 Jigsaw: Solving the Puzzle of Enterprise Analysis Yu­Chung ChengYu­Chung Cheng, John Bellardo, P´eter Benk¨o Alex C. Snoeren,
TCP PERFORMANCE OVER AD HOC NETWORKS Presented by Vishwanee Raghoonundun Assisted by Maheshwarnath Behary MSc Computer Networks Middlesex University.
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
Computer Networks Performance Metrics. Performance Metrics Outline Generic Performance Metrics Network performance Measures Components of Hop and End-to-End.
1 Mobile ad hoc networking with a view of 4G wireless: Imperatives and challenges Myungchul Kim Tel:
1 Network Monitoring Mi-Jung Choi Dept. of Computer Science KNU
Written by Yu-Chung Cheng, John Bellardo, Peter Benko, Alex C. Snoeren, Geoffrey M. Voelker and Stefan Savage Written by Yu-Chung Cheng, John Bellardo,
MOJO: A Distributed Physical Layer Anomaly Detection System for WLANs Richard D. Gopaul CSCI 388.
Curtis Kelsey University of Missouri. Introduction Method Experiment Results Conclusion Summary.
Wireless Hotspots: Current Challenges and Future Directions CNLAB at KAIST Presented by An Dong-hyeok Mobile Networks and Applications 2005.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
Network Diagnostic Tool (NDT) Duplex-Mismatch detection update Fall Member Meeting Sept 21, 2005 Rich Carlson
1/26 Module C - Part 2 DOMINO Detection Of greedy behavior in MAC layer of IEEE public NetwOrks Prof. JP Hubaux Mobile Networks
1 Evaluating NGI performance Matt Mathis
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
Wi-Fi. Basic structure: – Stations plus an access point – Stations talk to the access point, then to outside – Access point talks to stations – Stations.
1 Transport Control Protocol for Wireless Connections ElAarag and Bassiouni Vehicle Technology Conference 1999.
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks TCP.
Resolve today’s IT management dilemma Enable generalist operators to localize user perceptible connectivity problems Raise alerts prioritized by the amount.
Tip Pengembangan Aplikasi Onno W. Purbo
Inferring Internet Denial-of-Service Activity Authors: David Moore, Geoffrey M. Voelker and Stefan Savage; University of California, San Diego Publish:
Access Link Capacity Monitoring with TFRC Probe Ling-Jyh Chen, Tony Sun, Dan Xu, M. Y. Sanadidi, Mario Gerla Computer Science Department, University of.
Discovering Sensor Networks: Applications in Structural Health Monitoring Summary Lecture Wireless Communications.
Maintaining and Updating Windows Server 2008 Lesson 8.
1 Ad-hoc Transport Layer Protocol (ATCP) EECS 4215.
Manajemen Jaringan, Sukiswo ST, MT 1 Network Monitoring Sukiswo
Cognitive Wi-Fi.
Ad-hoc Transport Layer Protocol (ATCP)
How to avoid killing the wireless internet with your phone
Jigsaw: Solving the Puzzle of Enterprise Analysis
Xiuzhen Cheng Csci332 MAS Networks – Challenges and State-of-the-Art Research – Wireless Mesh Networks Xiuzhen Cheng
Beyond FTP & hard drives: Accelerating LAN file transfers
Presentation transcript:

11 Automating Cross-Layer Diagnosis of Enterprise Wireless Networks Yu-Chung Cheng Mikhail Afanasyev Patrick Verkaik Jennifer Chiang Alex C. Snoeren Stefan Savage Geoffrey M. Voelker University of California, San Diego, USA Péter Benkö Ericsson Research, Hungary

2 The Enterprise Network  Blanket coverage = fast and reliable connection?

3 Wireless: 54 Mbps TCP: 3 Bps!?

4 Our story at UCSD CSE SSH is dog slow!? … Disconnected every 5min! … Can not connect in the last hour … Can not connect in the last hour … Can not connect in the last hour … Can not connect in the last hour … Cannot connect in the last hour! …

5 Why is it hard to figure out?  Problems can be anywhere Across layers – protocols Software incompatibilities – implementations Transient or persistent - time Radio propagates in free space and across channels – locations/frequencies APs bridge wireless and wired worlds – infrastructure  To diagnose the root cause Gather data everywhere Analyze across all layers/interactions Time-consuming task for human Sys Admin

6 Goal  Automate the diagnostic process to respond to users and admins  Have the admins spend the least amount of time diagnosing and most of their time fixing

7 Our approach  Jigsaw: Monitor the whole wireless network [SIGCOMM06] Overlay existing WiFi with passive monitors At the wired gateway  Model mobility costs Start-up/roaming overheads  Model per packet dynamics Infer per packet delay and loss causes Essential for TCP

8 The journey of a packet in Wireless gateway CNN.com APUser Time Wired packet Data ACK (Lost) ACK Queuing Channel Sensing Exp. Backoff  Challenge: delays need to be inferred Impractical to instrument the APs and all the clients Most devices do not support such fine-grained measurements Tx Delay

9 Modeling packet delays  Emulate AP operations Based on observed events  At the gateway  Transmissions in the air  Infer when a packet … Head of TxQ Scheduled to TxQ Received by the AP Wired Gateway Pwr Sav Q AP TxQ Time Observed Event Modeled Event Q delay Ch. sensing Tx delay

10 Insight  Model AP-generated packets Observe the request and response, e.g., scan  Inferring critical configurations By packet timings From product/ specs  Verification Delay distributions Controlled experiment  Experience Vendors do not always follow the specs We can model Proxim/Cisco/Atheros APs with slight modifications

11 Applying delays to TCP diagnosis  Ticket User A complains about download performance in spite of having 54Mbps g connectivity Another 2 users are downloading large files through same AP from local UCSD site Performance of user A is limited by sharing the AP with other users

12 Bulk TCP performance problems  Measure bulk TCP performance bottlenecks Compares actual goodput with modeled ideal goodput [JP98]  Blame Model Is connection reaching optimal rate? Is receiver window ever filled up? Is Internet the bottleneck if we remove wireless delay/loss Is Wireless loss/delay the bottleneck Is per packet overhead too large? Rcv wnd = 0 Internet Delay/Loss Wireless Loss Over- protected Best Rate? Wireless Delay

13 UCSD CSE bulk TCP problems The per-packet analysis and blame model capability allow admins to focus on major problems

14 Conclusions  Diagnosing Enterprise wireless is tough Need to account for many factors Need to automate the process  It is possible to infer per packet dynamics to find root causes Fine-grained delay breakdowns Automatically assign root causes  Our experience at UCSD Various problems occur, no single anomaly Many vendor implementation issues  Work-in-progress A complete automatic diagnosis system

15 Q & A  Live traffic monitoring sysnet.ucsd.edu/wireless/ sysnet.ucsd.edu/wireless/  Also in our paper What takes your laptop 1 minute to connect every time Why active scanning can be in-efficient and cause severe hidden terminal problems