• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

DMCA

Jigsaw: Solving the puzzle of enterprise 802.11 analysis (2006)

Cached

  • Download as a PDF

Download Links

  • [www.cs.utexas.edu]
  • [www.it.uu.se]
  • [www.it.uu.se]
  • [www.it.uu.se]
  • [www.seas.gwu.edu]
  • [www.it.uu.se]
  • [www.it.uu.se]
  • [www.it.uu.se]
  • [www.csc.calpoly.edu]
  • [www-cse.ucsd.edu]
  • [www.cs.ucsd.edu]
  • [www.cse.ucsd.edu]
  • [www.cs.washington.edu]
  • [cseweb.ucsd.edu]
  • [cseweb.ucsd.edu]
  • [users.csc.calpoly.edu]
  • [charlotte.ucsd.edu]
  • [cseweb.ucsd.edu]
  • [cseweb.ucsd.edu]
  • [www.cs.ucsd.edu]
  • [www.cse.ucsd.edu]
  • [www.cse.ucsd.edu]
  • [www-cse.ucsd.edu]
  • [www.cs.ucsd.edu]
  • [cseweb.ucsd.edu]
  • [www.cse.ucsd.edu]
  • [www.cs.ucsd.edu]
  • [www.cs.ucsd.edu]
  • [cseweb.ucsd.edu]
  • [cseweb.ucsd.edu]
  • [cseweb.ucsd.edu]
  • [cseweb.ucsd.edu]
  • [cseweb.ucsd.edu]
  • [cseweb.ucsd.edu]

  • Other Repositories/Bibliography

  • DBLP
  • Save to List
  • Add to Collection
  • Correct Errors
  • Monitor Changes
by Yu-chung Cheng , John Bellardo , Péter Benkö , Alex C. Snoeren , Geoffrey M. Voelker , Stefan Savage
Venue:In SIGCOMM
Citations:174 - 12 self
  • Summary
  • Citations
  • Active Bibliography
  • Co-citation
  • Clustered Documents
  • Version History

BibTeX

@INPROCEEDINGS{Cheng06jigsaw:solving,
    author = {Yu-chung Cheng and John Bellardo and Péter Benkö and Alex C. Snoeren and Geoffrey M. Voelker and Stefan Savage},
    title = {Jigsaw: Solving the puzzle of enterprise 802.11 analysis},
    booktitle = {In SIGCOMM},
    year = {2006},
    pages = {39--50}
}

Share

Facebook Twitter Reddit Bibsonomy

OpenURL

 

Abstract

The combination of unlicensed spectrum, cheap wireless interfaces and the inherent convenience of untethered computing have made 802.11-based networks ubiquitous in the enterprise. Modern universities, corporate campuses and government offices routinely deploy scores of access points to blanket their sites with wireless Internet access. However, while the fine-grained behavior of the 802.11 protocol itself has been well studied, our understanding of how large 802.11 networks behave in their full empirical complexity is surprisingly limited. In this paper, we present a system called Jigsaw that uses multiple monitors to provide a single unified view of all physical, link, network and transport-layer activity on an 802.11 network. To drive this analysis, we have deployed an infrastructure of over 150 radio monitors that simultaneously capture all 802.11b and 802.11g activity in a large university building (1M+ cubic feet). We describe the challenges posed by both the scale and ambiguity inherent in such an architecture, and explain the algorithms and inference techniques we developed to address them. Finally, using a 24-hour distributed trace containing more than 1.5 billion events, we use Jigsaw’s global cross-layer viewpoint to isolate performance artifacts, both explicit, such as management inefficiencies, and implicit, such as co-channel interference. We believe this is the first analysis combining this scale and level of detail for a production 802.11 network.

Keyphrases

single unified view    modern university    transport-layer activity    cheap wireless interface    inference technique    jigsaw global cross-layer viewpoint    fine-grained behavior    ambiguity inherent    co-channel interference    access point    deploy score    performance artifact    24-hour distributed trace    radio monitor    multiple monitor    11-based network    large university building    wireless internet access    unlicensed spectrum    government office    inherent convenience    corporate campus    cubic foot    full empirical complexity    first analysis    management inefficiency   

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University