On the Fidelity of 802.11 Packet Traces

Packet traces from 802.11 wireless networks are incomplete both fundamentally, because antennas do not pick up every transmission, and practically, because the hardware and software of collection may be under provisioned. One strategy toward improving the completeness of a trace of wireless network traffic is to deploy several monitors; these are likely to capture (and miss) different packets. Merging these traces into a single, coherent view requires inferring access point (AP) and client behavior; these inferences introduce errors. In this paper, we present methods to evaluate the fidelity of merged and independent wireless network traces. We show that wireless traces contain sufficient information to measure their completeness and clock accuracy. Specifically, packet sequence numbers indicate when packets have been dropped, and AP beacon intervals help determine the accuracy of packet timestamps. We also show that trace completeness and clock accuracy can vary based on load. We apply these metrics to evaluate fidelity in two ways: (1) to visualize the completeness of different 802.11 traces, which we show with several traces available on CRAWDAD and (2) to estimate the uncertainty in the time measurements made by the individual monitors.

[1]  Robert Tappan Morris,et al.  ExOR: opportunistic multi-hop routing for wireless networks , 2005, SIGCOMM '05.

[2]  Kevin C. Almeroth,et al.  CRAWDAD dataset ucsb/ietf2005 (v.2005-10-19) , 2005 .

[3]  Stefan Savage,et al.  Jigsaw: solving the puzzle of enterprise 802.11 analysis , 2006, SIGCOMM.

[4]  Moustafa Youssef,et al.  A framework for wireless LAN monitoring and its applications , 2004, WiSe '04.

[5]  Ashok K. Agrawala,et al.  Measuring Traffic on the Wireless Medium: Experience and Pitfalls , 2002 .

[6]  Robert Morris,et al.  Link-level measurements from an 802.11b mesh network , 2004, SIGCOMM 2004.

[7]  Tracy Camp,et al.  Stationary distributions for the random waypoint mobility model , 2004, IEEE Transactions on Mobile Computing.

[8]  Stefan Savage,et al.  Automating cross-layer diagnosis of enterprise wireless networks , 2007, SIGCOMM.

[9]  Andreas Haeberlen,et al.  Fallacies in Evaluating Decentralized Systems , 2006, IPTPS.

[10]  T. Charles Clancy,et al.  MeshTest: Laboratory-Based Wireless Testbed for Large Topologies , 2007, 2007 3rd International Conference on Testbeds and Research Infrastructure for the Development of Networks and Communities.

[11]  Vern Paxson,et al.  Strategies for sound internet measurement , 2004, IMC '04.

[12]  Suresh Singh,et al.  CRAWDAD dataset pdx/vwave (v.2007-09-14) , 2007 .

[13]  Ratul Mahajan,et al.  Analyzing the MAC-level behavior of wireless networks in the wild , 2006, SIGCOMM 2006.

[14]  Robert Tappan Morris,et al.  Opportunistic routing in multi-hop wireless networks , 2004, Comput. Commun. Rev..

[15]  Mingyan Liu,et al.  Random waypoint considered harmful , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[16]  Ratul Mahajan,et al.  Measurement-based characterization of 802.11 in a hotspot setting , 2005, E-WIND '05.

[17]  Ratul Mahajan,et al.  CRAWDAD dataset uw/sigcomm2004 (v.2006-10-17) , 2006 .