Ranveer Chandra, Jitendra Padhye, Lenin Ravindranath, Alec Wolman.

Slides:



Advertisements
Similar presentations
SEMINAR ON Wi-Fi.
Advertisements

Virtual Trunk Protocol
Context-awareness, cloudlets and the case for AP-embedded, anonymous computing Anthony LaMarca Associate Director Intel Labs Seattle.
IEEE INFOCOM 2004 MultiNet: Connecting to Multiple IEEE Networks Using a Single Wireless Card.
PAWS: Use Cases I-D: draft-ietf-paws-problem-stmt-usecases-rqmts Basavaraj Patil, Scott Probasco (Nokia) Juan Carlos Zuniga (Interdigital) IETF 82.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-1 Extending Switched Networks with Virtual LANs Introducing VLAN Operations.
Submission doc.: IEEE 11-13/0343r0 Operator Oriented Wi-Fi — Problem Analysis and Proposals Dapeng Liu Chunju Shao Fang Xie Ge Liu China Mobile.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential 1 IEEE u Overview Klaas Wierenga TF-Mobility Loughborough, May 7, 2009.
Umut Girit  One of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer.
Medium Access Control Onno W. Purbo
Remote Procedure Call (RPC)
Secure Socket Layer.
Location Based Services Lenin Ravindranath, Microsoft Research India.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
Wi-Fi Neighborcast: Enabling communication among nearby clients
© 2009 Research In Motion Limited Methods of application development for mobile devices.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture.
Oct 21, 2004CS573: Network Protocols and Standards1 IP: Addressing, ARP, Routing Network Protocols and Standards Autumn
CCNA Exploration Semester 3 Modified by Profs. Ward and Cappellino
What is adaptive web technology?  There is an increasingly large demand for software systems which are able to operate effectively in dynamic environments.
Romney Bake Brian Peterson Clay Stephens Michael Hatheway.
Layer 2 Switch  Layer 2 Switching is hardware based.  Uses the host's Media Access Control (MAC) address.  Uses Application Specific Integrated Circuits.
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—2-1 Implementing VLANs in Campus Networks Applying Best Practices for VLAN Topologies.
Wi-Fi Neighborcast: Enabling communication among nearby clients
Mapping Internet Addresses to Physical Addresses (ARP)
Wireless and Security CSCI 5857: Encoding and Encryption.
Unwanted Link Layer Traffic in Large IEEE Wireless Network By Naga V K Akkineni.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
VLAN Trunking Protocol (VTP)
Jaringan Komputer Dasar OSI Transport Layer Aurelio Rahmadian.
Towards Programmable Enterprise WLANs With Odin
CWNA Guide to Wireless LANs, Second Edition
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
IEEE Wireless LAN Part II Access Point, Power Management, Polling, and Frame Format 14-1.
Delivering Location Sensitive Advertisements Using Wi-Fi Networks Ranveer Chandra, Jitu Padhye, Lenin Ravindranath, Alec Wolman Microsoft Research.
Wireless II. Frames Frames – Notes 3 Frame type ▫Management  Beacons  Probes  Request  Response  Associations  Request  Response  Disassociate.
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Submission doc.: IEEE 11-12/0281r0 March 2012 Jarkko Kneckt, NokiaSlide 1 Recommendations for association Date: Authors:
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Designing for High Density Wireless LANs Last Update Copyright Kenneth M. Chipps Ph.D.
Cisco 3 - Switching Perrine. J Page 16/4/2016 Chapter 4 Switches The performance of shared-medium Ethernet is affected by several factors: data frame broadcast.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 9 Virtual Trunking Protocol.
GLOBAL EDGE SOFTWERE LTD1 R EMOTE F ILE S HARING - Ardhanareesh Aradhyamath.
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
Interactive Connectivity Establishment : ICE
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Doc.: IEEE /1219r4 Submission March, 2006 S. Ponnuswamy (Aruba Networks)Slide 1 Virtual AP Presentation Notice: This document has been prepared.
Doc.: IEEE yy/xxxxr0 Submission January 2012 Jarkko Kneckt (Nokia)Slide 1 Scanning with FILS Date: Authors:
Exploration 3 Chapter 4. What is VTP? VTP allows a network manager to configure a switch so that it will propagate VLAN configurations to other switches.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
IP: Addressing, ARP, Routing
Instructor Materials Chapter 6 Building a Home Network
September 2004 Extending MAC Management operation for external networks information advertisement to the AP using L 2.5
Discussion on the Multi-band Discovery Assistance Proposal
BSS Scanning through Low Power Radio
Consideration on WUR frame for Fast Scanning
Consideration on WUR frame for Fast Scanning
WiFi Ads Delivering Location Sensitive Ads Using Wireless Networks
Multi-band Discovery Assistance
Enhancements to Mesh Discovery
Multi-band Discovery Assistance
Stephen McCann, Siemens Roke Manor
FILS Frame Content Date: Authors: February 2008
On ESS Mesh Device Discovery
Presentation transcript:

Ranveer Chandra, Jitendra Padhye, Lenin Ravindranath, Alec Wolman

Which AP is serving client C? At any given point in time, there should be only one answer Responsibility for relaying downstream traffic Secondary purposes: PSM, capability negotiation broadcast applications: certain information is Inherently relevant to a particular location Largely independent of the receiving client e.g. not confidential

Wi-Fi clients perform scans to discover nearby APs (disconnected and connected) Passive Scans Stations switch channels, listening for beacons Active Scans Stations send probe requests, listen for probe responses Networks Found Connected

Low bandwidth communication protocol for IEEE (Wi-Fi) networks Construct a transport protocol by overloading beacons Clients receive information from nearby APs Even when they are disconnected When connected to another AP Primarily for broadcast applications Two way communication is also possible

Network Selection Localized Advertisements

Beacons overloaded with Pricing Information Number of active users Other network utilization Information (e.g k ) Help end users or client software in making connection decisions

Handheld devices with Wi-Fi are proliferating Embed advertisements in beacons Clients receive ads regardless of their connection status Implicitly location-sensitive Push model of ad delivery – improves privacy model Can include dynamic information e.g. 4 tables free, or 15 minute wait Delivery of advertisements over the Internet has become a huge market Ads are targeted – Relevant to the user Location-sensitive advertisements already becoming an important market

AdCenter AP at CoffeeDay WiFi Beacon Within 250 m of CoffeeDay CoffeeDay close to me.. Hmm! I love Hot Choc! Go to CoffeeDay Coffee DayDrink of the day is Hot Chocolate Client running our software

AP fragments each message and sends in successive beacons Client application performs reassembly, and presents the information to users Each fragment is of the form: -This identifies the specific message -Fragment number -Boolean indicating whether there are more fragments in this message -Arbitrary byte stream (usually text)

Three encoding strategies Overload the SSID Overload the BSSID Create a new Information Element

SSID is network name with 32 byte limit Pros User level client software is enough, no driver mods Cons Low Bandwidth Spams the user-interface (e.g. zero-config) Networks Found Connected

BSSID length: only 6 bytes per beacon All messages can use the same SSID, say BeaconTransport Client assembles message from multiple beacons Pros User level client software Avoids the spam problem Cons Very low bandwidth

Each beacon carries a set of Information Elements Other management frames too (Probe Request, Probe Response) is extensible (sort-of) – Element IDs reserved Maximum length of an Information Element: 253 bytes Pros Moderate bandwidth Also avoids spam Feels less like an ugly hack Cons Requires driver modifications on most clients (except Vista)

When a fragment is lost, so is entire message FEC, or probes to request retransmissions Throughput 100 ms is typical beacon interval, easy to adjust Airtime utilization Not necessary to send at lowest data rate Power management

We have built access point & client implementations on XP Recently finished version of client for Windows Mobile Future Test deployment (at MS? Or a local mall?) Implement bi-directional communication (e.g. pub/sub for ads) Questions?

Clients receive beacons (hence ads) even when they are not connected to any network Clients receive beacons from other networks even when they are connected to a particular network Client need not send any information to the Access Point Can update Ad text to include dynamic information Number of tickets left Daily specials in a restaurant Stock quotes

Starbucks: Get 10% off a Hot Chocolate Step 1: Coupon DistributionStep 2: Coupon Validation Present coupon Discounted Coffee User does not have to connect to the Internet!

Competitors AP sends fake coupons e.g. Tullys AP sends invalid coupons for Starbucks Solution: ASP generates public-private key pair for all registered stores Coupon is encrypted with stores private key E[coupon + time of validity] store_private_key Time of validity prevents replay of outdated coupons Store/ASP sends encrypted coupon to APs APs broadcasts encrypted coupons Clients validate coupon by decrypting with stores public key

User awareness: Require user input AP tracking: Track which AP distributed the coupon Limited coupons: Limit number of distributed coupons AP not connected to Internet