1 Architecture and Techniques for Diagnosing Faults in IEEE 802.11 Infrastructure Networks Atul Adya, Victor Bahl, Ranveer Chandra, Lili Qiu Microsoft.

Slides:



Advertisements
Similar presentations
Enterprise Wireless LAN (WLAN) Management and Services
Advertisements

MultiNet: Connecting to Multiple IEEE Networks Using a Single Radio Ranveer Chandra, Cornell University joint work with: Victor Bahl (MSR) and Pradeep.
1 Fault Analysis for Large-scale Campus-wide Wireless Networks Jian Chen Department of CS, Tsinghua University, Beijing, China.
1 DAIR: Dense Array of Inexpensive Radios Managing Enterprise Wireless Networks Using Desktop Infrastructure Victor Bahl, Jitendra Padhye, Lenin Ravnindranath,
IEEE INFOCOM 2004 MultiNet: Connecting to Multiple IEEE Networks Using a Single Wireless Card.
“All your layer are belong to us” Rogue APs, DHCP/DNS Servers, and Fake Service Traps.
Chapter 14 Wireless Attacks, Intrusion Monitoring and Policy
Wi-Fi Neighborcast: Enabling communication among nearby clients
Final Presentation Presented By: Gal Leibovich Liran Manor Supervisor: Hai Vortman.
Overview r Ethernet r Hubs, bridges, and switches r Wireless links and LANs.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
1 DAIR: Dense Array of Inexpensive Radios Managing Enterprise Wireless Networks Using Desktop Infrastructure Victor Bahl †, Jitendra Padhye †, Lenin Ravnindranath.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Hidden Terminal based Attack, Diagnosis and Detection Yao Zhao, Leo Zhao, Yan Chen Lab for Internet & Security Tech, Northwestern Univ.
6: Wireless and Mobile Networks6-1 Chapter 6: Wireless and Mobile Networks Background: r # wireless (mobile) phone subscribers now exceeds # wired phone.
6/2/05CS118/Spring051 Chapter 6: Wireless and Mobile Networks r Cover the following sections only:  6.3: wireless LANs  6.5: mobility management:
Handoff Delay for b Wireless LANs Masters Project defense Anshul Jain Committee: Dr. Henning Schulzrinne, Columbia University Dr. Zongming Fei, University.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Troubleshooting methods. Module contents  Avaya Wireless tools  Avaya Wireless Client Manager  Avaya Wireless AP Manager  Hardware indicators  Non.
Wireless LAN Technology
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
Wi-Fi Neighborcast: Enabling communication among nearby clients
Adapted from: Computer Networking, Kurose/Ross 1DT066 Distributed Information Systems Chapter 6 Wireless, WiFi and mobility.
A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet.
VoIP Packets In the Air and Over the Wire J. Scott Haugdahl CTO
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Router LAN Switching and Wireless – Chapter 7.
WiFiProfiler: Cooperative Diagnosis in Wireless LANs Ranveer Chandra, Venkat Padmanabhan, Ming Zhang Microsoft Research.
Enhancing the Security of Corporate Wi-Fi Networks using DAIR PRESENTED BY SRAVANI KAMBAM 1.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
CWNA Guide to Wireless LANs, Second Edition
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Configure a Wireless Router LAN Switching and Wireless – Chapter 7.
Architecture and Techniques for Diagnosing Faults in IEEE Infrastructure Networks Summary presented by Rubeel M Iqbal 1.
The University of Bolton School of Business & Creative Technologies Wireless Networks Introduction 1.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 6: Implement Wireless Scalability.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Configure a Wireless Router Chapter 7.
Wireless Access avoid collisions: 2 + nodes transmitting at same time CSMA - sense before transmitting –don’t collide with ongoing transmission by other.
PRESENTATION ON WI-FI TECHNOLOGY
Written by Yu-Chung Cheng, John Bellardo, Peter Benko, Alex C. Snoeren, Geoffrey M. Voelker and Stefan Savage Written by Yu-Chung Cheng, John Bellardo,
Opportunistic Use of Client Repeaters to Improve Performance of WLANs Victor Bahl 1, Ranveer Chandra 1, Patrick P. C. Lee 2, Vishal Misra 2, Jitendra Padhye.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
Overview of Mobile Wireless Communication Student Presentations and Research Papers National Wireless Communications Technology Roadmap Trends in Communications.
Versatile Low Power Media Access for Wireless Sensor Networks Sarat Chandra Subramaniam.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
Wi-Fi. Basic structure: – Stations plus an access point – Stations talk to the access point, then to outside – Access point talks to stations – Stations.
Troubleshooting Mesh Networks Lili Qiu Joint Work with Victor Bahl, Ananth Rao, Lidong Zhou Microsoft Research Mesh Networking Summit 2004.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
Resolve today’s IT management dilemma Enable generalist operators to localize user perceptible connectivity problems Raise alerts prioritized by the amount.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
COMP2322 Lab 1 Introduction to Wireless LAN Weichao Li Apr. 8, 2016.
IEEE Wireless LAN Standard
Chapter-7 Basic Wireless Concepts and Configuration.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
Module Overview Overview of Wireless Networks Configure a Wireless Network.
Outline What is Wireless LAN Wireless Transmission Types
Group 2: Qiuxi Zhu, Buchao Yu, Guoxi Wang
Wireless Networking Chapter 23.
CS 457 – Lecture 7 Wireless Networks
Wireless LAN Security 4.3 Wireless LAN Security.
Slobodan Milanko Manweiler, J., Franklin, P., & Choudhury, R. R. (2012, March). RxIP: Monitoring the health of home wireless networks. In INFOCOM, 2012.
EEC-484/584 Computer Networks
WiFi Ads Delivering Location Sensitive Ads Using Wireless Networks
EEC-484/584 Computer Networks
Presentation transcript:

1 Architecture and Techniques for Diagnosing Faults in IEEE Infrastructure Networks Atul Adya, Victor Bahl, Ranveer Chandra, Lili Qiu Microsoft Research

2 Wireless Network Woes How many times have you heard users say: –“My machine says: wireless connection unavailable” –“Why can’t my machine authenticate?” –“My performance on wireless really sucks” IT Dept: Several hundred complaints per month You may have heard network admins say: –“I wonder if some one has sneakily installed an unauthorized access point” –“Do we have complete coverage in all the buildings?”

3 Enterprise Wireless Problems Main problems observed by IT department: –Connectivity: RF Holes –Authentication: 802.1x protocol issues –Performance: Unexplained delays –Security: Rogue APs

4 Existing Products Provide management/diagnostic functions –E.g., AirWave, CA’s NSM, Air Defense, Air Magnet Insufficient functionality: –No support for disconnected clients –Weak root-cause analysis (raw data, mostly) –Diagnosis only from the AP perspective –Sometimes need expensive sensor deployment

5 Our Contributions Flexible client-based framework for detection and diagnosis of wireless faults Client Conduit: communication for disconnected clients via nearby connected clients Diagnostic mechanisms –Approximate location of disconnected clients –Rogue AP detection –Performance problem analysis

6 Talk Outline Diagnostics architecture and implementation Client Conduit: diagnosing disconnected clients Diagnostic mechanisms –Locating disconnected clients –Detecting unauthorized APs –Analyzing performance problems Summary and Future Work

7 Assumptions Can install diagnostic software on clients –APs are typically closed platforms –Can provide improved diagnosis with modified APs Nearby clients available for fault diagnosis –At least 13 active clients on our floor (approx sq. feet) Network admins maintain AP Location Database

8 Diagnostic AP Module (DAP) Client-Centric Architecture RADIUSKerberos Legacy AP Disconnected Client Client Conduit Authentication/User Info Diagnostic Client Module (DC) Diagnostic Server (DS)

9 Diagnostic Architecture Properties Exploits client-view of network (not just APs) Supports proactive and reactive mechanisms Scalable Secure

10 Client Implementation Prototype system on Windows Native WiFi: Extensibility framework for [Microsoft Networking 2003] Daemon: most of functionality and main control flow IM driver: limited changes –Packet capture & monitoring

11 Talk Outline Diagnostics architecture and implementation Client Conduit: diagnosing disconnected clients Diagnostic mechanisms –Locating disconnected clients –Detecting unauthorized APs –Analyzing performance problems Summary and Future Work

12 Cause of Disconnection Lack of coverage –In an RF Hole –Just outside AP range Authentication issues, e.g., stale certificates Protocol problems, e.g., no DHCP address Can we communicate via nearby connected clients?

13 Communication via Nearby Clients Possible (unsatisfactory) solutions: Multiple radios: extra radio for diagnostics MultiNet [InfoCom04]: Multiplex “Happy” between Infrastructure/Adhoc modes Penalizing normal case behavior for rare scenario Connected Client “Happy” (Infrastructure) Disconnected Client “Grumpy” Access Point Cannot be on 2 networks. Packet dropped! SOS Adhoc Mode

14 Stops beaconing Our Solution: Client Conduit Connected Client “Happy” Disconnected Client “Grumpy” Access Point Disconnected station detected Becomes an Access Point (Starts beaconing) SOS (Beacon) SOS Ack (Probe Req) Ad hoc network via MultiNet Help disconnected wireless clients with: Online diagnosis Certificate bootstrapping Disconnected Client “Not-so-Grumpy”

15 Client Conduit Features Incurs no extra overhead for connected clients –Use existing messages: beacons & probes Works with legacy APs Includes security mechanisms to avoid abuses

16 Time for “Grumpy” to get connected < 7 seconds –Reduced time can enable transparent recovery Bandwidth available for diagnosis > 400 Kbps (when “Happy” donates only 20% of time) Client Conduit Performance

17 Talk Outline Diagnostics architecture and implementation Client Conduit: diagnosing disconnected clients Diagnostic mechanisms –Locating disconnected clients –Detecting unauthorized APs –Analyzing performance problems Summary and Future Work

18 Locating Disconnected Clients Goal: Approximately locate to determine RF Holes Solution: Use nearby connected clients “Grumpy” starts beaconing Nearby clients report signal strength to server Diagnostic server uses RADAR [ InfoCom00 ] twice –Locates connected clients –Locates “Grumpy” with clients as “anchor points” Location error: 10 – 15 meters

19 Talk Outline Diagnostics architecture and implementation Client Conduit: diagnosing disconnected clients Diagnostic mechanisms –Locating disconnected clients –Detecting unauthorized APs –Analyzing performance problems Summary and Future Work

20 Rogue AP Problems Why problematic? Allow network access to unauthorized users Hurt performance: interfere with existing APs Detection goals: Common case: mistakes by employees Detect unauthorized IEEE APs –Not considering non-compliant APs Solution: Use clients for monitoring nearby APs

21 Rogue AP Detection Clients monitor nearby APs. Send to server: –MAC address, Channel, SSID, RSSI (for location) Server checks 4-tuple in AP Location Database Obtaining AP Information at clients: –Same/overlapping channel as client: from Beacons –AP on non-overlapping channel: Active Scan periodically AP information from Probe Response

22 Rogue AP Detection Overheads Bandwidth usage < 0.2 Kbps per client Can active scans be performed without disruption? –Sufficient idleness available (2½ – 3 min.) –Simple threshold-based prediction: Active scan completed in idle period for 95% cases

23 Talk Outline Diagnostics architecture and implementation Client Conduit: diagnosing disconnected clients Diagnostic mechanisms –Locating disconnected clients –Detecting unauthorized APs –Analyzing performance problems Summary and Future Work

24 Summary Diagnostics critical for deployments Client-centric architecture Client Conduit Diagnosis using nearby clients –Locate disconnected clients –Detect rogue APs –Analyze performance problems Prototype in Windows using Native WiFi –Mechanisms are effective with low overheads

25 Future Work Detecting Rogue Ad Hoc networks 802.1x protocol analyzer Detailed wireless delay analyzer Automated recovery after fault diagnosis