1 Fault Analysis for Large-scale Campus-wide Wireless Networks Jian Chen 01-15-2009 Department of CS, Tsinghua University, Beijing, China.

Slides:



Advertisements
Similar presentations
TWO STEP EQUATIONS 1. SOLVE FOR X 2. DO THE ADDITION STEP FIRST
Advertisements

Wi-Fi Technology.
Wi-Fi Technology ARTI J JANSARI M.E.(C.S.E.):-1ST (E.C.)
Introduction to the WatchGuard AP Device
1 © 2001, Cisco Systems, Inc. Updated_ Mobile IP Lessons Learned The early years.
1 UNIT I (Contd..) High-Speed LANs. 2 Introduction Fast Ethernet and Gigabit Ethernet Fast Ethernet and Gigabit Ethernet Fibre Channel Fibre Channel High-speed.
1 Copyright © 2010, Elsevier Inc. All rights Reserved Fig 2.1 Chapter 2.
1 Copyright © 2013 Elsevier Inc. All rights reserved. Chapter 38.
1 Chapter 40 - Physiology and Pathophysiology of Diuretic Action Copyright © 2013 Elsevier Inc. All rights reserved.
By D. Fisher Geometric Transformations. Reflection, Rotation, or Translation 1.
Network Monitoring System In CSTNET Long Chun China Science & Technology Network.
Reconsidering Reliable Transport Protocol in Heterogeneous Wireless Networks Wang Yang Tsinghua University 1.
Wireless Testbed in Tsinghua University Fenghua Li Network Research Center of Tsinghua University AsianFI 2008.
1 Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
Legacy Coexistence – A Better Way?
Doc.: IEEE /xxxr0 Tutorial November 2004 Backes, MontemurroSlide 1 MAC enhancements for Media Independent RF Management of Wireless 802 Networks.
1 IEEE Media Independent Handoff Overview of services and scenarios for 3GPP2 Stefano M. Faccin Liaison officer to 3GPP2.
Doc.: IEEE xxx Submission May 10-14, 2004 Alan Carlton, Interdigital CommunicationsSlide 1 Defining Layer 2.5 Alan Carlton Interdigital Communications.
Business Transaction Management Software for Application Coordination 1 Business Processes and Coordination.
Wireless Networks Should Spread Spectrum On Demand Ramki Gummadi (MIT) Joint work with Hari Balakrishnan.
1 The Case for Heterogeneous Wireless MACs Chun-cheng Chen Haiyun Luo Dept. of Computer Science, UIUC.
1 DAIR: Dense Array of Inexpensive Radios Managing Enterprise Wireless Networks Using Desktop Infrastructure Victor Bahl, Jitendra Padhye, Lenin Ravnindranath,
Interference Avoidance and Control Ramki Gummadi (MIT) Joint work with Rabin Patra (UCB) Hari Balakrishnan (MIT) Eric Brewer (UCB)
Electronic Resources in the EUI Library
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
0 - 0.
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
MULTIPLYING MONOMIALS TIMES POLYNOMIALS (DISTRIBUTIVE PROPERTY)
ADDING INTEGERS 1. POS. + POS. = POS. 2. NEG. + NEG. = NEG. 3. POS. + NEG. OR NEG. + POS. SUBTRACT TAKE SIGN OF BIGGER ABSOLUTE VALUE.
SUBTRACTING INTEGERS 1. CHANGE THE SUBTRACTION SIGN TO ADDITION
MULT. INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
Addition Facts
ZMQS ZMQS
Università degli Studi di Firenze 08 July 2004 COST th MCM - Budapest, Hungary 1 Cross-layer design for Multiple access techniques in wireless communications.
A Bandwidth Allocation/Sharing/Extension Protocol for Multimedia Over IEEE Ad Hoc Wireless LANs Shiann-Tsong Sheu and Tzu-fang Sheu IEEE JOURNAL.
WLAN Validation 1 Motorola Public Document Classification, October 2011 MODULE 18 WLAN VALIDATION.
BT Wholesale October Creating your own telephone network WHOLESALE CALLS LINE ASSOCIATED.
Faculty of Computer Science & Engineering
1 Vidar Stokke Senior Engineer at the Norwegian University of Science and Technology, IT-division, Networking Programme: 1.History of wireless networks.
Networks: Introduction 1 CS4514 Computer Networks Term B06 Professor Bob Kinicki.
Application Server Based on SoftSwitch
ABC Technology Project
Rohan Murty Harvard University Jitendra Padhye, Ranveer Chandra, Alec Wolman, and Brian Zill Microsoft Research 1.
© S Haughton more than 3?
Twenty Questions Subject: Twenty Questions
Linking Verb? Action Verb or. Question 1 Define the term: action verb.
Squares and Square Root WALK. Solve each problem REVIEW:
Doc.: IEEE /0018r0 Submission May 2004 Steve Shellhammer, Intel CorporationSlide 1 IEEE Wireless Coexistence TAG Steve Shellhammer
Submission doc.: IEEE 11-13/0343r0 Operator Oriented Wi-Fi — Problem Analysis and Proposals Dapeng Liu Chunju Shao Fang Xie Ge Liu China Mobile.
1 First EMRAS II Technical Meeting IAEA Headquarters, Vienna, 19–23 January 2009.
Addition 1’s to 20.
25 seconds left…...
Test B, 100 Subtraction Facts
Week 1.
We will resume in: 25 Minutes.
1 Unit 1 Kinematics Chapter 1 Day
1 Understanding and Mitigating the Impact of RF Interference on Networks Ramki Gummadi (MIT), David Wetherall (UW) Ben Greenstein (IRS), Srinivasan.
User Security for e-Post Applications Dr Chandana Gamage University of Moratuwa.
1 © 2005 Cisco Systems, Inc. All rights reserved. CONFIDENTIAL AND PROPRIETARY INFORMATION Cisco Wireless Strategy Extending and Securing the Network Bill.
1 William Lee Duke University Department of Electrical and Computer Engineering Durham, NC Analysis of a Campus-wide Wireless Network February 13,
Dartmouth’s Wireless Network May 16, 2005 David W. Bourque.
1 Architecture and Techniques for Diagnosing Faults in IEEE Infrastructure Networks Atul Adya, Victor Bahl, Ranveer Chandra, Lili Qiu Microsoft.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 6: Implement Wireless Scalability.
MOJO: A Distributed Physical Layer Anomaly Detection System for WLANs Richard D. Gopaul CSCI 388.
How Bad Are The Rogues’ Impact on Enterprise Network Performance ? Kaixin Sui, Dan Pei, Youjian Zhao, Zimu Li Tsinghua University.
Challenges in (managing) Wireless Networks. Different types Licensed vs. unlicensed spectrum UWB GPRS Bluetooth Asymmetric networks (data on TV.
Wi-Fi Business Networking
ISMS Information Security Management System
Presentation transcript:

1 Fault Analysis for Large-scale Campus-wide Wireless Networks Jian Chen Department of CS, Tsinghua University, Beijing, China

2 Complaints From Users Why can not access Internet right here? A stupid wireless network Why do I access Internet so slowly, however he is surfing the webs very happy ? A stupid wireless network Why can not roam seamlessly from this building to another building? A stupid wireless network Why can not get through the authentication right now ? Why is the performance of wireless network extremely bad ?

3 Complaints From Users (cont..) Source from: [Atul Adya 04] Mobicom Number of wireless related complaints logged by the IT department of a major US corporation

4 Campus-wide Wireless Network Problems Coverage –RF Planning RF holes RF Overlap with same channel Security –Authentication –Authorization –Rogue AP Management –Mobility –Misconfiguration Performance –PHY Limited Capacity Broadcast wireless channel Time-varying Signal Noise Ratio (SNR) Transmitter Power Interference Semiduplex – MAC Random contention Backoff Retransmission Hidden terminal Rate fallback

5 Existing Solutions Wireless management system or diagnostic tools –AirWave, Air Magnet, Air Defense –Aruba WMS, Cisco WMS,….. Weakness –Measurement data only from AP perspective –Weak analysis function –Too much abundant information –Hard to find the root cause of wireless problems

6 Our Goal of Fault Analysis How many rogue APs are there in our campus-wide WLANs ? How many misconfigurations and security threats are there in our campus-wide WLANs ? What is the impact of existing configuration of AP on performance ? What can be done to reduce these rogue APs, misconfigurations, security threats and impact ?

7 Outline Background –CNGI ( China Next Generation Internet ) Campus-wide WLAN Measurement data from operational wireless network –MIB –System log Fault analysis Future work

8 CNGI Campus-wide WLAN

9 6 campus-wide wireless sub network –Total AP number : 977 –Heterogeneous wireless networks Aruba AP 61 Cisco AP 1010 GemTek P-720G –IPv6 support –Roaming support in each wireless sub network

10 Online-User Statistic

11 Traffic Statistic

12 AP Classification Mobility Controller Internet Wired Campus Network Router Switch Valid Interfering Rogue

13 Measurement Data From Operational Wireless Networks Collect SNMP info from routers, control switchs and APs of operational wireless networks. –117 GB –From 1 April,2008 to present Collect syslog from Wireless Management System, Wireless Intrusion Detection System and AAA server. –600 MB –From 20 Dec, 2008 to present

14 FIT Building, Floor 1, Tsinghua

15 FIT Building, Floor 2, Tsinghua

16 Caoguangbiao Building, Floor 3, Zhejiang University

17 Class Building 9, Floor 1, Zhejiang University

18 Rogue APs In FIT building of Tsinghua university –40 different SSIDs –37 valid APs –28 rogue APs –18 interfering APs Manufacturer AP type ArubaCiscoLinksysD-Link TP-LinkNetgearUnkown Valid APs 37 Rogue APs Interfering APs 32112

19 Misconfigured Privacy Violation Misconfigured Short Preamble Violation RF hole detected Rogue AP IDS: Ad-hoc Network Detected IDS: Wireless Bridge Detected IDS: Node Rate Anomaly IDS: Channel Rate Anomaly Misconfigurations and Security Threats

20 Future Work Synthesize data traces and MIB info Statistical methods –Make statistical distributions of misconfigurations and security threats Misconfiguration events distribution Security threats distribution Temporal distribution Frequency distribution –Analyze correlation model between misconfigurations and security threats Find the relationship between misconfigurations and security threats

21 Thank you !