2007
DOI: 10.1145/1282427.1282384
|View full text |Cite
|
Sign up to set email alerts
|

Automating cross-layer diagnosis of enterprise wireless networks

Abstract: Modern enterprise networks are of sufficient complexity that even simple faults can be difficult to diagnose -let alone transient outages or service degradations. Nowhere is this problem more apparent than in the 802.11-based wireless access networks now ubiquitous in the enterprise. In addition to the myriad complexities of the wired network, wireless networks face the additional challenges of shared spectrum, user mobility and authentication management. Not surprisingly, few organizations have the expertise,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
8
0

Year Published

2009
2009
2016
2016

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(8 citation statements)
references
References 22 publications
(6 reference statements)
0
8
0
Order By: Relevance
“…Anomaly detection is such an important aspect in many application domains and has been researched extensively within diverse research areas of IP networks [6][7], wireless 802.11 networks [8] [9][10] and intrusion detection for cyber security [11] [12]. The importance of anomaly detection being in 802.11 networks or in any other application domain is that, usually anomalies in usage data translates to significant, and often critical, actionable decisions.…”
Section: Related Workmentioning
confidence: 99%
“…Anomaly detection is such an important aspect in many application domains and has been researched extensively within diverse research areas of IP networks [6][7], wireless 802.11 networks [8] [9][10] and intrusion detection for cyber security [11] [12]. The importance of anomaly detection being in 802.11 networks or in any other application domain is that, usually anomalies in usage data translates to significant, and often critical, actionable decisions.…”
Section: Related Workmentioning
confidence: 99%
“…Centralized EWLAN management has been considered in the context of fault diagnosis [7], protocol extensibility [18], security enhancements, such as detecting rogue APs [4], AP channel assignment and power control [1], client association [19], and client localization [6]. Centaur [24] and Shuffle [16] consider conflictbased per-packet link scheduling, allowing hidden terminal mitigation via scheduling.…”
Section: Related Workmentioning
confidence: 99%
“…The overhead of coordination is offloaded to the out-of-band wired infrastructure, freeing the wireless spectrum for productive data communication. Deployment experiences show reduced hidden/exposed terminals [7], [24], greater spatial reuse [16], [24], smarter association [19], and a host of other enhancements to the end-user experience [1], [4], [6]. These techniques have proven practical, with commercial systems available from Aruba, Cisco, and Meru [17].…”
Section: Introductionmentioning
confidence: 99%
“…among wireless hosts and utilize shared information to analyze and resolve network problems. Cheng et al [17] developed a set of modelling techniques to model delays from physical layer to transport layer and how these delays affect each other. These models can be further used for automatic characterization of causes of the wireless network outages and service degradation.…”
Section: Related Workmentioning
confidence: 99%