Wi-Fi measurement projects (2001-2008, 2019-2023)

This project is no longer active; this page is no longer updated.

Related projects: [CRAWDAD], [DIST], [MAP], [Mobility-models], [NetSANI]

Related keywords: [wifi]


Summary

Wireless 802.11 (Wi-Fi) networks have become universal. In 2001, however, there were few large deployments and Dartmouth was one of the first universities to deploy a campus-wide Wi-Fi network. In 2001-02 we conducted the largest-ever characterization effort on a wireless network. In the initial effort we captured statistics and network traces from over 476 access points spread over 161 buildings at Dartmouth College, capturing the activity of nearly two thousand users. The original paper [kotz:campus] received the ACM SIGMOBILE Test-of-Time Paper Award in March 2017: "This paper was the first to systematically demonstrate how to measure and understand a production-scale wireless network, which was previously considered an impenetrable black box. This led to an incredible amount of follow-on work, with the measurement methods and analysis mechanisms proposed in this paper still being used. This paper was also the spark for the creation of the CRAWDAD data repository, which has been of immense value to the wireless research community."

Interested readers are directed to the journal paper [kotz:jcampus], however, for a more complete analysis and for some important corrections to the original results.

This work was described in a 2003 talk at Microsoft Research and a 2003 talk at Intel Research. (Apologies for the poor video quality -- they were transferred from VHS.)

The earliest (preliminary) report of this work was Pablo Stern's undergraduate thesis [stern:thesis].

We repeated the data-collection effort two years later and were able to measure trends and changes in network activity, as well as adding a new focus on VOIP and P2P traffic and on user mobility [henderson:jvoice, henderson:voice].

Along the way, we published methods for network measurement and analysis [henderson:measuring, henderson:esm].

Most recently (2019), We described and characterized the largest Wi-Fi network trace ever published: spanning seven years, approximately 3000 distinct access points, 40,000 authenticated users, and 600,000 distinct Wi-Fi stations. We described the methods used to capture and process the traces, and characterized the most prominent trends and changes during the seven-year span of the trace (2012-18). The analysis covers the same campus in the above papers, so we were able to comment on changes in patterns of usage, connection, and mobility in Wi-Fi deployments [camacho:longitudinal]. It also allowed us to explore methods for mining social interactions [martinez:poster].

We then applied the Multivariate Big Data Analysis (MBDA) methodology, a recently proposed interpretable data analysis tool in the detection and root-cause analysis of network anomalies. As a case study, we applied it a seven-year trace (from 2012 to 2018) of the Dartmouth Wi-Fi network's activity, with approximately 3,000 distinct access points, 40,000 authenticated users, and 600,000 distinct Wi-Fi stations [camacho:networkmetrics-j], with earlier versions of that work appearing as [camacho:networkmetrics, camacho:networkmetrics-tr, camacho:networkmetrics-tr2].

In 2004 we released the earliest data and founded CRAWDAD.org, a "Community Resource for Archiving Wireless Data at Dartmouth", to encourage broader sharing of such data across the research community.

We also mined the original data for many other studies -- see the list of related projects and keywords above, as well as some related projects [lee:thesis, mills:tettey-thesis].

In 2021, we proposed a system that, in a preliminary evaluation, was able to decide with 82% accuracy whether the location of an IoT device is inside or outside of a defined space based on a small number of transmitted Wi-Fi frames. See Paul Gralla's undergraduate thesis for details [gralla:inside-outside].


People

The following people were involved in wireless-data collection at Dartmouth: Denise Anthony, Ilya Abyzov, David Blinn, Guanling Chen, Kobby Essien, Jeff Fielding, Paul Gralla, Tristan Henderson, David Kotz, Nathan Schneider, and Pablo Stern.

In addition to the above people, the following were co-author on one or more papers listed below: Rasmus Bro, Elena Cabrera, José Camacho, Eduardo Antonio Mañas-Martínez, and Katarzyna Wasielewska.

Funding and acknowledgements

Each of the works described on this page were supported by one or more of the following sponors: Cisco Systems, Dartmouth Institute for Security Technology Studies (ISTS), DoCoMo USA Labs, Intel Corporation, the US National Science Foundation under Infrastructure Award number EIA-9802068, the US Department of Justice (Bureau of Justice Assistance) under award 2005-DD-BX-1091, and the US Department of Homeland Security (Science and Technology Directorate) under Award Number 2000-DT-CX-K001.

The CRAWDAD archive, which resulted from this work and which was the source of data for many papers in this work, was funded by the National Science Foundation under award number 0454062.

Author José Camacho was supported by the US Fulbright Scholars Program. He was also supported by the Ministerio de Educación, Cultura y Deporte under the Programa Estatal de Promoción de Talento y su Empleabilidad en I+D+i, Subprograma Estatal de Movilidad, del Plan Estatal de Investigación Científica y Técnica y de Innovación 2013-2016, grant number PRX17/00320 (associated to a Fulbright Scholarship); and the Plan Propio de la Universidad de Granada, grant number PP2017.VS.02.

The views and conclusions contained on this site and in its documents are those of the authors and should not be interpreted as necessarily representing the official position or policies, either expressed or implied, of the sponsor(s). Any mention of specific companies or products does not imply any endorsement by the authors or by the sponsor(s).


Papers (tagged 'wifi')

[Also available in BibTeX]

Papers are listed in reverse-chronological order; click an entry to pop up the abstract. For full information and pdf, please click Details link. Follow updates with RSS.

2024:
José Camacho, Katarzyna Wasielewska, Rasmus Bro, and David Kotz. Interpretable Learning in Multivariate Big Data Analysis for Network Monitoring. IEEE Transactions on Network and Service Management. June 2024. [Details]

There is an increasing interest in the development of new data-driven models useful to assess the performance of communication networks. For many applications, like network monitoring and troubleshooting, a data model is of little use if it cannot be interpreted by a human operator. In this paper, we present an extension of the Multivariate Big Data Analysis (MBDA) methodology, a recently proposed interpretable data analysis tool. In this extension, we propose a solution to the automatic derivation of features, a cornerstone step for the application of MBDA when the amount of data is massive. The resulting network monitoring approach allows us to detect and diagnose disparate network anomalies, with a data-analysis workflow that combines the advantages of interpretable and interactive models with the power of parallel processing. We apply the extended MBDA to two case studies: UGR’16, a benchmark flow-based real-traffic dataset for anomaly detection, and Dartmouth’18, the longest and largest Wi-Fi trace known to date.

2023:
José Camacho, Rasmus Bro, and David Kotz. Interpretable Learning in Multivariate Big Data Analysis for Network Monitoring. Technical Report, April 2023. [Details]

There is an increasing interest in the development of new data-driven models useful to assess the performance of communication networks. For many applications, like network monitoring and troubleshooting, a data model is of little use if it cannot be interpreted by a human operator. In this paper, we present an extension of the Multivariate Big Data Analysis (MBDA) methodology, a recently proposed interpretable data analysis tool. In this extension, we propose a solution to the automatic derivation of features, a cornerstone step for the application of MBDA when the amount of data is massive. The resulting network monitoring approach allows us to detect and diagnose disparate network anomalies, with a data-analysis workflow that combines the advantages of interpretable and interactive models with the power of parallel processing. We apply the extended MBDA to two case studies: UGR'16, a benchmark flow-based real-traffic dataset for anomaly detection, and Dartmouth'18, the longest and largest Wi-Fi trace known to date.

2021:
Eduardo Antonio Mañas-Martínez, Elena Cabrera, Katarzyna Wasielewska, David Kotz, and José Camacho. Mining social interactions in connection traces of a campus Wi-Fi network. Proceedings of the SIGCOMM Poster and Demo Sessions. August 2021. [Details]

Wi-Fi technologies have become one of the most popular means for Internet access. As a result, the use of mobile devices has become ubiquitous and instrumental for society. A device can be identified through its MAC address within an autonomous system. Although some devices attempt to anonymize MAC addresses via randomization, these techniques are not used once the device is associated to the network. As a result, device identification poses a privacy problem in large-scale (e.g., campus-wide) Wi-Fi deployments: if the mobile device can be located, the user who carries that device can also be located. In turn, location information leads to the possibility to extract private knowledge from Wi-Fi users, like social interactions, movement habits, and so forth.

In this poster we report preliminary work in which we infer social interactions of individuals from Wi-Fi connection traces in the campus network at Dartmouth College. We make the following contributions: (i) we propose several definitions of a pseudocorrelation matrix from Wi-Fi connection traces, which measure similarity between devices or users according to their temporal association profile to the Access Points (APs); (ii) we evaluate the accuracy of these pseudo-correlation variants in a simulation environment; and (iii) we contrast results with those found on a real trace.


Paul Gralla. An inside vs. outside classification system for Wi-Fi IoT devices. June 2021. Undergraduate Thesis. [Details]

We are entering an era in which Smart Devices are increasingly integrated into our daily lives. Everyday objects are gaining computational power to interact with their environments and communicate with each other and the world via the Internet. While the integration of such devices offers many potential benefits to their users, it also gives rise to a unique set of challenges. One of those challenges is to detect whether a device belongs to one’s own ecosystem, or to a neighbor – or represents an unexpected adversary. An important part of determining whether a device is friend or adversary is to detect whether a device’s location is within the physical boundaries of one’s space (e.g. office, classroom, home). In this thesis we propose a system that is able to decide with 82% accuracy whether the location of an IoT device is inside or outside of a defined space based on a small number of transmitted Wi- Fi frames. The classification is achieved by leveraging a machine-learning classifier trained and tested on RSSI data of Wi-Fi transmissions recorded by three or more observers. In an initialization phase the classifier is trained by the user on Wi-Fi transmissions of a variety of locations, inside (and outside). The system can be built with off-the-shelf Wi-Fi observing devices that do not require any special hardware modifications. With the exception of the training period, the system can accurately classify the indoor/outdoor state of target devices without any cooperation from the user or from the target devices.

2020:
José Camacho, Rasmus Bro, and David Kotz. Automatic Learning coupled with Interpretability: MBDA in Action. Proceedings of the Network Traffic Measurement and Analysis Conference (TMA). June 2020. [Details]

In this paper, we illustrate the application of Multivariate Big Data Analysis (MBDA), a recently proposed interpretable machine-learning method with application to Big Data sets. We apply MBDA for the first time for the detection and troubleshooting of network problems in a campus-wide Wi-Fi network. Data includes a seven-year trace (from 2012 to 2018) of the network’s most recent activity, with approximately 3,000 distinct access points, 40,000 authenticated users, and 600,000 distinct Wi-Fi stations. This is the longest and largest Wi-Fi trace known to date. Furthermore, we propose a new feature-learning procedure that solves an inherent limitation in MBDA: the manual definition of the features. The extended MBDA results in a methodology that allows network analysts to identify problems and diagnose them, which are principal tasks to troubleshoot the network and optimize its performance. In the paper, we go through the entire workflow of the approach, illustrating its application in detail and discussing processing times.

José Camacho, Chris McDonald, Ron Peterson, Xia Zhou, and David Kotz. Longitudinal analysis of a campus Wi-Fi network. Computer Networks. April 7, 2020. [Details]

In this paper we describe and characterize the largest Wi-Fi network trace ever published: spanning seven years, approximately 3000 distinct access points, 40,000 authenticated users, and 600,000 distinct Wi-Fi stations. The 7TB of raw data are pre-processed into connection sessions, which are made available for the research community. We describe the methods used to capture and process the traces, and characterize the most prominent trends and changes during the seven-year span of the trace. Furthermore, this Wi-Fi network covers the campus of Dartmouth College, the same campus detailed a decade earlier in seminal papers about that network and its users’ network behavior. We thus are able to comment on changes in patterns of usage, connection, and mobility in Wi-Fi deployments.

2019:
José Camacho, Rasmus Bro, and David Kotz. Networkmetrics unraveled: MBDA in Action. Technical Report, July 2019. [Details]

Networkmetrics is a new term that refers to the data-driven approach for monitoring, troubleshooting and understanding communication networks using multivariate analysis. Networkmetric models are powerful machine learning tools to interpret and interact with data collected from a network. In this paper, we illustrate the application of Multivariate Big Data Analysis (MBDA), a recently proposed networkmetric method with application to Big Data sets. We use MBDA for the detection and troubleshooting of network problems in a campus-wide Wi-Fi network. Data includes a seven-year trace (from 2012 to 2018) of the network’s most recent activity, with approximately 3,000 distinct access points, 40,000 authenticated users, and 600,000 distinct Wi-Fi stations. This is the longest and largest Wi-Fi trace known to date. To analyze this data, we propose learning and visualization procedures that extend MBDA. This results in a methodology that allows network analysts to identify problems and diagnose and troubleshoot them, optimizing the network performance. In the paper, we go through the entire workflow of the approach, illustrating its application in detail and discussing processing times in parallel hardware.

2008:
Tristan Henderson, David Kotz, and Ilya Abyzov. The Changing Usage of a Mature Campus-wide Wireless Network. Computer Networks. October 2008. [Details]

Wireless Local Area Networks (WLANs) are now commonplace on many academic and corporate campuses. As “Wi-Fi” technology becomes ubiquitous, it is increasingly important to understand trends in the usage of these networks. This paper analyzes an extensive network trace from a mature 802.11 WLAN, including more than 550 access points and 7000 users over seventeen weeks. We employ several measurement techniques, including syslog messages, telephone records, SNMP polling and tcpdump packet captures. This is the largest WLAN study to date, and the first to look at a mature WLAN. We compare this trace to a trace taken after the network’s initial deployment two years prior.

We found that the applications used on the WLAN changed dramatically, with significant increases in peer-to-peer and streaming multimedia traffic. Despite the introduction of a Voice over IP (VoIP) system that includes wireless handsets, our study indicates that VoIP has been used little on the wireless network thus far, and most VoIP calls are made on the wired network.

We saw greater heterogeneity in the types of clients used, with more embedded wireless devices such as PDAs and mobile VoIP clients. We define a new metric for mobility, the “session diameter”. We use this metric to show that embedded devices have different mobility characteristics than laptops, and travel further and roam to more access points. Overall, users were surprisingly non-mobile, with half remaining close to home about 98% of the time.


2006:
Tristan Henderson and David Kotz. Measuring Wireless LANs. Mobile, Wireless and Sensor Networks: Technology, Applications and Future Directions. 2006. [Details]

Wireless local area networks have become increasingly popular in recent years, and are now commonplace in many venues, including academic and corporate campuses, residences, and “hotspots” in public areas. It is important to understand how these wireless LANs are used, both for deploying networks, and for the development of future wireless networking protocols and applications.

In this chapter we discuss the measurement and analysis of the popular 802.11 family of wireless LANs. We describe the tools, metrics and techniques that are used to measure wireless LANs. The results of existing measurement studies are surveyed. We illustrate some of the problems that are specific to measuring wireless LANs, and outline some challenges for collecting future wireless traces.


2005:
Tristan Henderson, Denise Anthony, and David Kotz. Measuring wireless network usage with the experience sampling method. Proceedings of the Workshop on Wireless Network Measurements (WiNMee). April 2005. [Details]

Measuring wireless local area networks has proven useful for characterizing, modeling and provisioning these networks. These measurements are typically taken passively from a vantage point on the network itself. Client devices, or users, are never actively queried. These measurements can indicate what is happening on the network, but it can be difficult to infer why a particular behavior is occurring. In this paper we use the Experience Sampling Method (ESM) to study wireless network users. We monitored 29 users remotely for one week, and signaled them to fill out a questionnaire whenever interesting wireless behavior was observed. We find ESM to be a useful method for collecting data about wireless network usage that cannot be provided by network monitoring, and we present a list of recommendations for network researchers who wish to conduct an ESM study.

David Kotz and Kobby Essien. Analysis of a Campus-wide Wireless Network. Wireless Networks. January 2005. [Details]

Understanding usage patterns in wireless local-area networks (WLANs) is critical for those who develop, deploy, and manage WLAN technology, as well as those who develop systems and application software for wireless networks. This paper presents results from the largest and most comprehensive trace of network activity in a large, production wireless LAN. For eleven weeks we traced the activity of nearly two thousand users drawn from a general campus population, using a campus-wide network of 476 access points spread over 161 buildings at Dartmouth College. Our study expands on those done by Tang and Baker, with a significantly larger and broader population.

We found that residential traffic dominated all other traffic, particularly in residences populated by newer students; students are increasingly choosing a wireless laptop as their primary computer. Although web protocols were the single largest component of traffic volume, network backup and file sharing contributed an unexpectedly large amount to the traffic. Although there was some roaming within a network session, we were surprised by the number of situations in which cards roamed excessively, unable to settle on one access point. Cross-subnet roams were an especial problem, because they broke IP connections, indicating the need for solutions that avoid or accommodate such roams.


2004:
Tristan Henderson, David Kotz, and Ilya Abyzov. The Changing Usage of a Mature Campus-wide Wireless Network. Proceedings of the ACM International Conference on Mobile Computing and Networking (MobiCom). September 2004. [Details]

Wireless Local Area Networks (WLANs) are now commonplace on many academic and corporate campuses. As “Wi-Fi” technology becomes ubiquitous, it is increasingly important to understand trends in the usage of these networks.

This paper analyzes an extensive network trace from a mature 802.11 WLAN, including more than 550 access points and 7000 users over seventeen weeks. We employ several measurement techniques, including syslogs, telephone records, SNMP polling and tcpdump packet sniffing. This is the largest WLAN study to date, and the first to look at a large, mature WLAN and consider geographic mobility. We compare this trace to a trace taken after the network’s initial deployment two years ago.

We found that the applications used on the WLAN changed dramatically. Initial WLAN usage was dominated by Web traffic; our new trace shows significant increases in peer-to-peer, streaming multimedia, and voice over IP (VoIP) traffic. On-campus traffic now exceeds off-campus traffic, a reversal of the situation at the WLAN’s initial deployment. Our study indicates that VoIP has been used little on the wireless network thus far, and most VoIP calls are made on the wired network. Most calls last less than a minute.

We saw greater heterogeneity in the types of clients used, with more embedded wireless devices such as PDAs and mobile VoIP clients. We define a new metric for mobility, the “session diameter.” We use this metric to show that embedded devices have different mobility characteristics than laptops, and travel further and roam to more access points. Overall, users were surprisingly non-mobile, with half remaining close to home about 98% of the time.


Calvin Newport. Simulating mobile ad hoc networks: a quantitative evaluation of common MANET simulation models. Technical Report, June 2004. Available as Dartmouth Computer Science Technical Report TR2004-504. [Details]

Because it is difficult and costly to conduct real-world mobile ad hoc network experiments, researchers commonly rely on computer simulation to evaluate their routing protocols. However, simulation is far from perfect. A growing number of studies indicate that simulated results can be dramatically affected by several sensitive simulation parameters. It is also commonly noted that most simulation models make simplifying assumptions about radio behavior. This situation casts doubt on the reliability and applicability of many ad hoc network simulation results.

In this study, we begin with a large outdoor routing experiment testing the performance of four popular ad hoc algorithms (AODV, APRL, ODMRP, and STARA). We present a detailed comparative analysis of these four implementations. Then, using the outdoor results as a baseline of reality, we disprove a set of common assumptions used in simulation design, and quantify the impact of these assumptions on simulated results. We also more specifically validate a group of popular radio models with our real-world data, and explore the sensitivity of various simulation parameters in predicting accurate results. We close with a series of specific recommendations for simulation and ad hoc routing protocol designers.


Tristan Henderson, David Kotz, and Ilya Abyzov. The Changing Usage of a Mature Campus-wide Wireless Network. Technical Report, March 2004. [Details]

Wireless Local Area Networks (WLANs) are now common on academic and corporate campuses. As “Wi-Fi” technology becomes ubiquitous, it is increasingly important to understand trends in the usage of these networks. This paper analyzes an extensive network trace from a mature 802.11 WLAN, including more than 550 access points and 7000 users over seventeen weeks. We employ several measurement techniques, including syslogs, telephone records, SNMP polling and tcpdump packet sniffing. This is the largest WLAN study to date, and the first to look at a large, mature WLAN and consider geographic mobility. We compare this trace to a trace taken after the network’s initial deployment two years ago.

We found that the applications used on the WLAN changed dramatically. Initial WLAN usage was dominated by Web traffic; our new trace shows significant increases in peer-to-peer, streaming multimedia, and voice over IP (VoIP) traffic. On-campus traffic now exceeds off-campus traffic, a reversal of the situation at the WLAN’s initial deployment. Our study indicates that VoIP has been used little on the wireless network thus far, and most VoIP calls are made on the wired network. Most calls last less than a minute.

We saw more heterogeneity in the types of clients used, with more embedded wireless devices such as PDAs and mobile VoIP clients. We define a new metric for mobility, the “session diameter.” We use this metric to show that embedded devices have different mobility characteristics than laptops, and travel further and roam to more access points. Overall, users were surprisingly non-mobile, with half remaining close to home about 98% of the time.


2003:
Tristan Henderson and David Kotz. Problems with the Dartmouth wireless SNMP data collection. Technical Report, December 2003. [Details]

The original Dartmouth wireless network study used SNMP to query the college’s Cisco 802.11b access points. The perl scripts that performed the SNMP queries suffered from some problems, in that they queried inappropriate SNMP values, or misunderstood the meaning of other values. This data was also used in a subsequent analysis. The same scripts were used to collect data for a subsequent study of another wireless network. This document outlines these problems and indicates which of the data collected by the original scripts may be invalid.

Clara Lee. Persistence and Prevalence in the Mobility of Dartmouth Wireless Network Users. Technical Report, May 2003. The data in this paper is highly suspect; see TR2003-480. Available as Dartmouth Computer Science Technical Report TR2003-455. [Details]

Wireless local-area networks (WLANs) are increasing in popularity. As more people use WLANs it is important to understand how these users behave. We analyzed data collected over three months of 2002 to measure the persistence and prevalence of users of the Dartmouth wireless network.

We found that most of the users of Dartmouth's network have short association times and a high rate of mobility. This observation fits with the predominantly student population of Dartmouth College, because students do not have a fixed workplace and are moving to and from classes all day.


2002:
David Kotz and Kobby Essien. Analysis of a Campus-wide Wireless Network. Technical Report, September 2002. [Details]

Understanding usage patterns in wireless local-area networks (WLANs) is critical for those who develop, deploy, and manage WLAN technology, as well as those who develop systems and application software for wireless networks. This paper presents results from the largest and most comprehensive trace of network activity in a large, production wireless LAN. For eleven weeks we traced the activity of nearly two thousand users drawn from a general campus population, using a campus-wide network of 476 access points spread over 161 buildings. Our study expands on those done by Tang and Baker, with a significantly larger and broader population.

We found that residential traffic dominated all other traffic, particularly in residences populated by newer students; students are increasingly choosing a wireless laptop as their primary computer. Although web protocols were the single largest component of traffic volume, network backup and file sharing contributed an unexpectedly large amount to the traffic. Although there was some roaming within a network session, we were surprised by the number of situations in which cards roamed excessively, unable to settle on one access point. Cross-subnet roams were an especial problem, because they broke IP connections, indicating the need for solutions that avoid or accommodate such roams.


David Kotz and Kobby Essien. Analysis of a Campus-wide Wireless Network. Proceedings of the ACM International Conference on Mobile Computing and Networking (MobiCom). September 2002. Revised and corrected as Dartmouth CS Technical Report TR2002-432. Winner of ACM SIGMOBILE Test-of-Time award, 2017. [Details]

Understanding usage patterns in wireless local-area networks (WLANs) is critical for those who develop, deploy, and manage WLAN technology, as well as those who develop systems and application software for wireless networks. This paper presents results from the largest and most comprehensive trace of network activity in a large, production wireless LAN. For eleven weeks we traced the activity of nearly two thousand users drawn from a general campus population, using a campus-wide network of 476 access points spread over 161 buildings. Our study expands on those done by Tang and Baker, with a significantly larger and broader population.

We found that residential traffic dominated all other traffic, particularly in residences populated by newer students; students are increasingly choosing a wireless laptop as their primary computer. Although web protocols were the single largest component of traffic volume, network backup and file sharing contributed an unexpectedly large amount to the traffic. Although there was some roaming within a network session, we were surprised by the number of situations in which cards roamed excessively, unable to settle on one access point. Cross-subnet roams were an especial problem, because they broke IP connections, indicating the need for solutions that avoid or accommodate such roams.


David Kotz and Kobby Essien. Characterizing Usage of a Campus-wide Wireless Network. Technical Report, March 2002. [Details]

Wireless local-area networks (WLANs) are increasingly common, but little is known about how they are used. A clear understanding of usage patterns in real WLANs is critical information to those who develop, deploy, and manage WLAN technology, as well as those who develop systems and application software for wireless networks. This paper presents results from the largest and most comprehensive trace of network activity in a large, production wireless LAN. For eleven weeks we traced the activity of nearly two thousand users drawn from a general campus population, using a campus-wide network of 476 access points spread over 161 buildings. Our study expands on those done by Tang and Baker, with a significantly larger and broader population.

We found that residential traffic dominated all other traffic, particularly in residences populated by newer students; students are increasingly choosing a wireless laptop as their primary computer. Although web protocols were the single largest component of traffic volume, network backup and file sharing contributed an unexpectedly large amount to the traffic. Although there was some roaming within a network session, we were surprised by the number of situations in which cards roamed excessively, unable to settle on one access point. Cross-subnet roams were an especial problem, because they broke IP connections, indicating the need for solutions that avoid or accommodate such roams.


2001:
G. Ayorkor Mills-Tettey. Mobile Voice Over IP (MVOIP): An Application-level Protocol. Technical Report, June 2001. Available as Dartmouth Computer Science Technical Report TR2001-390. [Details]

Current Voice over Internet Protocol (VOIP) protocols require participating hosts to have fixed IP addresses for the duration of a VOIP call. When using a wireless-enabled host, such as a tablet computer on an 802.11 wireless network, it is possible for a participant in a VOIP call to roam around the network, moving from one subnet to another and needing to change IP addresses. This address change creates the need for mobility support in VOIP applications.

We present the design of Mobile Voice over IP (MVOIP), an application-level protocol that enables such mobility in a VOIP application based on the ITU H.323 protocol stack. An MVOIP application uses hints from the surrounding network to determine that it has switched subnets. It then initiates a hand-off procedure that comprises pausing its current calls, obtaining a valid IP address for the current subnet, and reconnecting to the remote party with whom it was in a call. Testing the system shows that on a Windows 2000 platform there is a perceivable delay in the hand-off process, most of which is spent in the Windows API for obtaining DHCP addresses. Despite this bottleneck, MVOIP works well on a wireless network.


Pablo Stern. Measuring early usage of Dartmouth's wireless network. Technical Report, June 2001. Available as Dartmouth Computer Science Technical Report TR2001-393. [Details]

In Spring 2001, Dartmouth College installed a campus-wide 802.11b wireless network. To understand how that network is used, we examined the usage characteristics of the network over a five-week period. We monitored access points to determine user behavior, and user and network traffic characteristics. Because our study coincided with the deployment of the access points, our analysis captures the growth of a wireless network. The results of this study help understand the behavior of mobile users and provide a reference to network engineers wishing to deploy and expand similar wireless networks.


[Kotz research]