Commit 86bfe8fd8aee56ac1d236554928c59fef633cf4c
1 parent
f3dadab6
design
Showing
10 changed files
with
151 additions
and
59 deletions
challenges.tex
common.tex
conclusion.tex
design.tex
| 1 | 1 | \section{System Design} |
| 2 | 2 | \label{sec:design} |
| 3 | + | |
| 4 | +\begin{figure*}[t] | |
| 5 | + \centering | |
| 6 | + \includegraphics[width=\textwidth]{./figures/design.pdf} | |
| 7 | + \caption{\textbf{\wisefi{} System Work Flow.}} | |
| 8 | + \label{fig:design} | |
| 9 | +\end{figure*} | |
| 10 | + | |
| 11 | +Inspired by the results of the investigation in Section~\ref{sec:investigation}, | |
| 12 | +we design a system called \wisefi{} to detect reciprocal sharing | |
| 13 | +opportunities (\S\ref{subsec:detection}), enable \wifi{} sharing | |
| 14 | +(\S\ref{subsec:sharing}) and monitor the \wifi{} performance to ensure the | |
| 15 | +sharing remains reciprocal (\S\ref{subsec:monitoring}). Figure~\ref{fig:design} | |
| 16 | +shows the overall work flow of the \wisefi{} system. | |
| 17 | + | |
| 18 | +\subsection{Detection} | |
| 19 | +\label{subsec:detection} | |
| 20 | + | |
| 21 | +To detect reciprocal sharing opportunities, two information are required: the | |
| 22 | +home AP of the device, and neighbor APs' signal strength during \wifi{} sessions | |
| 23 | +with the home AP. A smartphone application will be deployed through app market | |
| 24 | +to collect these information. In particular, the home AP information can be | |
| 25 | +learned over a period of time using the heuristics developed in | |
| 26 | +Section~\ref{subsec:homeap}, or be resolved through user input. \wifi{} scan | |
| 27 | +results during sessions with home APs can then be logged to identify the | |
| 28 | +neighbor APs that can potentially provide better signal. Finally, these | |
| 29 | +information are uploaded and fused in \wisefi{} server to identify reciprocal | |
| 30 | +sharing opportunities as described in Section~\ref{subsec:reciprocal}. | |
| 31 | + | |
| 32 | +\subsection{Sharing} | |
| 33 | +\label{subsec:sharing} | |
| 34 | + | |
| 35 | +Once the reciprocal sharing opportunities are discovered, the \wisefi{} server | |
| 36 | +can then distribute such information to the smartphone clients, which will | |
| 37 | +prompt users to establish \wifi{} sharing. The sharing mechanism must meet two | |
| 38 | +goals: control and protection. First, the system should be able to control the | |
| 39 | +sharing, including granting the access of home AP to other \wisefi{} users, and | |
| 40 | +revoking the access when the reciprocal sharing opportunity no longer exists. | |
| 41 | +Second, the system should protect the home network from other \wisefi{} users by | |
| 42 | +sharing access only to the Internet, and protecting private resources such as | |
| 43 | +network printer or home network storage. | |
| 44 | + | |
| 45 | +For home APs which support virtual guest network feature, the \wifi{} sharing | |
| 46 | +can be achieved by only distributing the credential of guest network to other | |
| 47 | +\wisefi{} users. Access and traffic policies can then be enforced on the guest | |
| 48 | +network to achieve control and protection. For APs without guest network | |
| 49 | +feature, however, cumbersome AP configurations may be required, such as MAC | |
| 50 | +black or white list, routing table entry. Such configurations are probably too | |
| 51 | +complicated for average users to perform. We discuss possible solutions in | |
| 52 | +Section~\ref{sec:challenges}. | |
| 53 | + | |
| 54 | + | |
| 55 | +\subsection{Monitoring} | |
| 56 | +\label{subsec:monitoring} | |
| 57 | + | |
| 58 | +After the sharing is established, the system needs to monitor the \wifi{} | |
| 59 | +performance to ensure that the sharing remains reciprocal. There are two | |
| 60 | +reasons. First, as mentioned in Section~\ref{subsec:better}, the system uses | |
| 61 | +signal strength as a hint to identify potentially better APs. And it is well | |
| 62 | +known that signal strength does not directly translate to \wifi{} performance. | |
| 63 | +Other factors, such as AP load, modulation, interference, or \wifi{} generation, | |
| 64 | +which can not be easily detected by the smartphone, also affect the link | |
| 65 | +quality. Furthermore, last hop \wifi{} link quality does not necessarily | |
| 66 | +determines the overall end-to-end network performance. Therefore, whether | |
| 67 | +connecting to neighbor AP can indeed improve the user's network performance is | |
| 68 | +unknown until the sharing is actually established. Second, it is important to ensure that | |
| 69 | +the sharing remains reciprocal in long terms for fairness concerns. For | |
| 70 | +instance, a \wisif{} user may have a new AP deployed at home such that the home APs | |
| 71 | +always provide better or comparable \wifi{} coverage than the neighbor APs, and | |
| 72 | +there are no longer needs to share neighbor APs. The system should be able to | |
| 73 | +detect the termination of the reciprocal sharing relationship and revoke the | |
| 74 | +peer's access to the user's home AP. | |
| 75 | + | ... | ... |
figures/design.odg
0 โ 100644
No preview for this file type
figures/design.pdf
0 โ 100644
No preview for this file type
investigation.tex
| ... | ... | @@ -4,10 +4,10 @@ |
| 4 | 4 | \section{Investigation} |
| 5 | 5 | \label{sec:investigation} |
| 6 | 6 | |
| 7 | -To investigate such reciprocal sharing opportunities, we obtain a \wifi{} scan | |
| 8 | -result dataset from \PhoneLab{} (\S\ref{subsec:phonelab}). We first develop | |
| 9 | -heuristics to identify home AP information for each device | |
| 10 | -(\S\ref{subsec:homeap}). Then we show the RSSI comparison between user's home | |
| 7 | +To investigate such reciprocal sharing opportunities, we obtained a \wifi{} scan | |
| 8 | +result dataset from \PhoneLab{} (\S\ref{subsec:phonelab}). We first discuss some | |
| 9 | +heuristics to identify the home AP for each device | |
| 10 | +(\S\ref{subsec:homeap}). Then we show the RSSI comparison between a user's home | |
| 11 | 11 | and neighbor APs (\S\ref{subsec:better}). Finally, we explore the reciprocal |
| 12 | 12 | sharing relationships in the dataset (\S\ref{subsec:reciprocal}). |
| 13 | 13 | |
| ... | ... | @@ -26,7 +26,6 @@ sharing relationships in the dataset (\S\ref{subsec:reciprocal}). |
| 26 | 26 | Observed APs & \num{1197522} \\ |
| 27 | 27 | Used APs & \num{15668} \\ \midrule |
| 28 | 28 | \wifi{} Sessions & \num{466032} \\ |
| 29 | - Total Connection Time (Days) & \num{34721} \\ | |
| 30 | 29 | \bottomrule |
| 31 | 30 | \end{tabularx} |
| 32 | 31 | \caption{\textbf{\PhoneLab{} \wifi{} Dataset Summary.} Used APs refers to the |
| ... | ... | @@ -37,13 +36,13 @@ sharing relationships in the dataset (\S\ref{subsec:reciprocal}). |
| 37 | 36 | \PhoneLab{}\cite{phonelab-sensemine13} is a public smartphone platform testbed |
| 38 | 37 | operated at the University at Buffalo. Several hundreds of participants carry |
| 39 | 38 | instrumented Nexus 5 smartphones as their primary device. In particular, the |
| 40 | -smartphone platform was modified to log each \wifi{} scan results as well as | |
| 39 | +smartphone platform was modified to log each \wifi{} scan result as well as | |
| 41 | 40 | connection events naturally generated by the Android system. Note that the same |
| 42 | -information can also be collected by applications with appropriate permissions. | |
| 41 | +information can also also be collected by applications with appropriate permissions. | |
| 43 | 42 | Table~\ref{tab:summary} summarizes the \PhoneLab{} \wifi{} dataset. |
| 44 | 43 | |
| 45 | -\wifi{} scan result represents the device's network visibility, and consists of | |
| 46 | -multiple entries---each corresponds to one \wifi{} Access Point (AP) the device | |
| 44 | +A \wifi{} scan result represents the device's network visibility, and consists of | |
| 45 | +multiple entries---each corresponds to one \wifi{} AP the device | |
| 47 | 46 | observed. The content of one entry includes: (1) beacon timestamp, (2) AP SSID |
| 48 | 47 | and BSSID, (3) AP channel and (4) RSSI. Additionally, the timestamp when the |
| 49 | 48 | scan was performed is also logged. |
| ... | ... | @@ -51,20 +50,20 @@ scan was performed is also logged. |
| 51 | 50 | \subsection{Home AP Detection} |
| 52 | 51 | \label{subsec:homeap} |
| 53 | 52 | |
| 54 | -In following analysis, we focus on home \wifi{} networks which are more likely | |
| 55 | -to reveal stable and immediate reciprocal sharing opportunities. For this | |
| 56 | -purpose, we first develop several heuristics to identify the home AP for each | |
| 57 | -device in the dataset. The intuition is that the devices are most likely | |
| 58 | -connected to home AP at night. More specifically, to identify the home AP for a | |
| 59 | -device, we look at \wifi{} sessions happened during 12~AM and 4~AM and count the | |
| 60 | -number of days that the device connects to each AP during this time period. We | |
| 61 | -then identify the AP which has the largest day count as the device's home AP, | |
| 53 | +We focus on home \wifi{} networks which are more likely to reveal stable and | |
| 54 | +immediate reciprocal sharing opportunities. For this purpose, we first developed | |
| 55 | +several heuristics to identify the home AP for each device in the dataset. The | |
| 56 | +intuition is that the devices are most likely connected to their home AP at | |
| 57 | +night. More specifically, to identify the home AP for a device, we look at | |
| 58 | +\wifi{} sessions that happened during 12~AM and 4~AM and count the number of | |
| 59 | +days that the device connects to each AP during this time period. We then | |
| 60 | +identify the AP which has the largest day count as the device's home AP, | |
| 62 | 61 | provided that the day count is larger than a threshold (30 days). |
| 63 | 62 | |
| 64 | 63 | After applying the above heuristics, the home AP information of 107 devices are |
| 65 | 64 | identified, including 101 unique BSSIDs. There are 6 BSSIDs that are identified |
| 66 | -as home AP for two devices. After further investigation and clarification with | |
| 67 | -\PhoneLab{} administrator, we found this is because some participants are family | |
| 65 | +as home APs for two devices. After further investigation and clarification with | |
| 66 | +\PhoneLab{} administrators, we found this is because some participants are family | |
| 68 | 67 | members, and certain participants had device replacements during the data |
| 69 | 68 | collection period. In both cases, multiple devices may be associated with the |
| 70 | 69 | same home AP. |
| ... | ... | @@ -72,27 +71,30 @@ same home AP. |
| 72 | 71 | \subsection{\wifi{} Session Signal Strength} |
| 73 | 72 | \label{subsec:better} |
| 74 | 73 | |
| 75 | -After identified home AP information, we then ask these two questions: (1) When | |
| 76 | -the device is connected to home AP, how often does it receive a better signal | |
| 74 | +After identifying the home AP for each device, we ask two questions: (1) When | |
| 75 | +the device is connected to its home AP, how often does it receive a better signal | |
| 77 | 76 | from neighbors' APs which it does not have access to? and (2) When the home AP |
| 78 | -fails to provide best signal, is there one dominant neighbor AP among others | |
| 77 | +fails to provide the best signal, is there one dominant neighbor AP | |
| 79 | 78 | that provides better signal most of the time? |
| 80 | 79 | |
| 81 | -To answer the first question, we inspect scan results that are reported during | |
| 82 | -\wifi{} sessions with home APs. For each such scan result, we identify the | |
| 83 | -currently associated home AP, $AP_{home}$, and the AP with best RSSI among all | |
| 84 | -reported APs, denoted as $AP_{best}$. We are particularly interested in which we | |
| 85 | -refer as \textit{sub-optimal} cases, where: (1) $AP_{home} \neq AP_{best}$; (2) | |
| 86 | -the device never connects to $AP_{best}$ in the dataset; and (3) the RSSI of | |
| 87 | -$AP_{best}$ is better than $AP_{home}$ by at least certain threshold (5dBm in | |
| 88 | -our analysis). Such cases indicate that the device could potentially improve its | |
| 89 | -\wifi{} performance by connecting to neighbor APs which have better signals yet it | |
| 90 | -does not have access to. Note that here we consider RSSI as a hint in determining the | |
| 91 | -\textit{optimal} AP and it is well understood that RSSI does not directly translate | |
| 92 | -to \wifi{} performance, which we will discuss in Section~\ref{sec:challenges}. | |
| 93 | -Also note that the cases when the device are not connected to APs with best | |
| 94 | -signal due to bad roaming strategies are not interesting in the context of this | |
| 95 | -paper, and are excluded by the second condition. | |
| 80 | +\sloppy{% | |
| 81 | + To answer the first question, we inspect scan results that are reported during | |
| 82 | + \wifi{} sessions with home APs. For each such scan result, we identify the | |
| 83 | + currently associated home AP, $AP_{home}$, and the AP with best RSSI among all | |
| 84 | + reported APs, denoted as $AP_{best}$. We are particularly interested in | |
| 85 | + \textit{sub-optimal} cases, where: (1) $AP_{home} \neq AP_{best}$; (2) the | |
| 86 | + device never connects to $AP_{best}$ in the dataset; and (3) the RSSI of | |
| 87 | + $AP_{best}$ is better than $AP_{home}$ by at least a certain threshold (5~dBm | |
| 88 | + in our analysis). Such cases indicate that the device could potentially | |
| 89 | + improve its \wifi{} performance by connecting to a neighbor AP which has a | |
| 90 | + strong signal yet it does not have access to that AP. Note that here we | |
| 91 | + consider RSSI as a hint in determining the \textit{optimal} AP and it is well | |
| 92 | + understood that RSSI does not directly translate to \wifi{} performance, which | |
| 93 | + we will discuss in Section~\ref{sec:challenges}. Also note that the cases | |
| 94 | + when the device is not connected to APs with the strongest signal due to bad | |
| 95 | + roaming strategies are not interesting in the context of this paper, and are | |
| 96 | + excluded by the second condition. | |
| 97 | +} | |
| 96 | 98 | |
| 97 | 99 | \begin{figure}[t] |
| 98 | 100 | \centering |
| ... | ... | @@ -104,23 +106,23 @@ paper, and are excluded by the second condition. |
| 104 | 106 | We classify all scan results reported during \wifi{} sessions with home APs into |
| 105 | 107 | two categories: sub-optimal and the rest. For each device, we calculate the |
| 106 | 108 | percentage of time when the scan results indicate sub-optimal association. |
| 107 | -Figure~\ref{fig:suboptimal} shows the CDF of such percentage for | |
| 109 | +Figure~\ref{fig:suboptimal} shows the CDF of this percentage for | |
| 108 | 110 | the 107 devices. We make several observations. First, for 80\% of the devices, |
| 109 | 111 | their home APs usually provides best signal (sub-optimal percentage less than |
| 110 | 112 | 25\%). This result is not particularly surprising considering that home APs are |
| 111 | -usually carefully positioned to try to provide good coverage. Second, we notice | |
| 113 | +usually carefully positioned to provide good coverage. Second, we notice | |
| 112 | 114 | that for certain number (8\%) of devices, their home APs failed to provide best |
| 113 | 115 | signal for more than 40\% of the time, suggesting that these users may benefit |
| 114 | 116 | from sharing the \wifi{} access of their neighbor APs. |
| 115 | 117 | |
| 116 | -Next, we are interested to see when the device is in a sub-optimal association | |
| 117 | -with its home AP, whether there exists a \textit{dominant} neighbor AP that | |
| 118 | -usually provides the best signal among other neighbor APs. If such dominant | |
| 118 | +Next, we want to answer the question when the device is in a sub-optimal association | |
| 119 | +with its home AP, is there a \textit{dominant} neighbor AP that | |
| 120 | +usually provides the best signal among other neighbor APs? If such dominant | |
| 119 | 121 | neighbor AP exists, then by just sharing access of this one particular neighbor |
| 120 | 122 | AP, the device's sub-optimal association time can be largely reduced. To this |
| 121 | -end, we look at all the scan results in sub-optimal category, and count the | |
| 123 | +end, we look at all the scan results in the sub-optimal category, and count the | |
| 122 | 124 | number of times that each neighbor AP appears as $AP_{best}$. For each device, |
| 123 | -we calculate the fraction of dominant neighbor AP. Figure~\ref{fig:dominantap} | |
| 125 | +we calculate the fraction of the dominant neighbor AP. Figure~\ref{fig:dominantap} | |
| 124 | 126 | shows the CDF of dominant AP fraction. For 50\% of the devices, one particular |
| 125 | 127 | neighbor AP contributes to more than 57\% of sub-optimal connection time, |
| 126 | 128 | implying that even by sharing \wifi{} access of one neighbor AP, these device's |
| ... | ... | @@ -138,7 +140,7 @@ sub-optimal connection time can be reduced by more than 57\%. |
| 138 | 140 | \label{subsec:reciprocal} |
| 139 | 141 | |
| 140 | 142 | Finally, we investigate the cases where two devices can obtain better signals |
| 141 | -from each other's home AP, i.e., reciprocal sharing opportunity. We first use | |
| 143 | +from each other's home AP, i.e., reciprocal sharing opportunities. We first use | |
| 142 | 144 | scan results to establish physical neighbor information between the home APs. |
| 143 | 145 | Then we investigate whether reciprocal sharing opportunities exist between |
| 144 | 146 | neighbor APs. |
| ... | ... | @@ -149,16 +151,17 @@ AP_j \rangle \in E$ if $AP_i$ and $AP_j$ appear in the same result and both AP's |
| 149 | 151 | signal strengths are larger than a threshold (80~dBm), meaning $AP_i$ and $AP_j$ |
| 150 | 152 | are physically colocated with each other. Figure 3 shows the constructed $G_{neighbor}$ |
| 151 | 153 | from the dataset, where nodes with no edges are omitted. There are three clear |
| 152 | -cluster of home APs. We also verified that APs in the same cluster have | |
| 154 | +clusters of home APs. We also verified that APs in the same cluster have | |
| 153 | 155 | different SSID and manufacturer, confirming that they are not centrally deployed |
| 154 | 156 | or managed. |
| 155 | 157 | |
| 156 | 158 | Next, we look into potential AP sharing opportunities among colocated APs. For |
| 157 | 159 | each edge $\langle AP_i, AP_j \rangle \in E$, if $AP_i$'s clients receive better |
| 158 | -(by at least 5~dBm) signals from $AP_j$, then we draw a directed edge $\langle | |
| 160 | +(by at least 5~dBm) signal from $AP_j$, then we draw a directed edge $\langle | |
| 159 | 161 | AP_i\rightarrow AP_j \rangle}$, indicating that $AP_i$'s clients could |
| 160 | 162 | potentially benefit from sharing access of $AP_j$. We also assign a weight to |
| 161 | -each directed edge to indicate how often such relationship happens. | |
| 163 | +each directed edge to indicate how often such relationship happens in the | |
| 164 | +dataset. | |
| 162 | 165 | |
| 163 | 166 | The updated home AP neighbor graph is shown in Figure~\ref{fig:reciprocal}. |
| 164 | 167 | Sharing opportunities are sparse but exist. In particular, we observe one pair |
| ... | ... | @@ -183,9 +186,3 @@ relationships. |
| 183 | 186 | Thickness of directed edges corresponds to edge weights.} |
| 184 | 187 | \label{fig:reciprocal} |
| 185 | 188 | \end{figure} |
| 186 | - | |
| 187 | - | |
| 188 | - | |
| 189 | -\newpage | |
| 190 | -\clearpage | |
| 191 | - | ... | ... |
paper.tex
| ... | ... | @@ -32,9 +32,9 @@ |
| 32 | 32 | \numberofauthors{1} |
| 33 | 33 | |
| 34 | 34 | \author{% |
| 35 | - \alignauthor Jinghao Shi, Liwen Gui, Chunming Qiao\\Dimitrios Koutsonikolas and Geoffrey Challen\\% | |
| 36 | - \affaddr{University at Buffalo}\\[0.05in]% | |
| 37 | - \email{\texttt{\{jinghaos,liwengui,qiao,dimitrio,challen\}@buffalo.edu}}\\ | |
| 35 | +% \alignauthor Jinghao Shi, Liwen Gui, Chunming Qiao\\Dimitrios Koutsonikolas and Geoffrey Challen\\% | |
| 36 | +% \affaddr{University at Buffalo}\\[0.05in]% | |
| 37 | +% \email{\texttt{\{jinghaos,liwengui,qiao,dimitrio,challen\}@buffalo.edu}}\\ | |
| 38 | 38 | Paper \#\thepapernumber{}% |
| 39 | 39 | \vspace*{-0.1in} |
| 40 | 40 | } |
| ... | ... | @@ -54,10 +54,10 @@ Paper \#\thepapernumber{}% |
| 54 | 54 | \input{investigation.tex} |
| 55 | 55 | \input{design.tex} |
| 56 | 56 | \input{challenges.tex} |
| 57 | +\input{related.tex} | |
| 57 | 58 | \input{conclusion.tex} |
| 58 | 59 | |
| 59 | 60 | {\footnotesize |
| 60 | - \balance | |
| 61 | 61 | \bibliographystyle{abbrv} |
| 62 | 62 | \bibliography{references} |
| 63 | 63 | } | ... | ... |
references.bib
related.tex
0 โ 100644
| 1 | +\section{Related Works} | |
| 2 | +\label{sec:related} | |
| 3 | + | |
| 4 | +FON~\cite{fon} is a global Wifi sharing network, where registered users can roam | |
| 5 | +over FON-supported Wifi networks. WLAN owners share their Wifi network either | |
| 6 | +for small money compensation, or to get Wifi access to other users when they are | |
| 7 | +way from home (roaming). FON aims at providing global Wifi sharing community | |
| 8 | +where users want to connect to others' Wifi network only because they are way | |
| 9 | +from home and have no WLAN access. Whereas in our proposal, users share Wifi | |
| 10 | +network locally (within neighbors) for better network performance. The sharing | |
| 11 | +relationship is a stable and tight loop. | ... | ... |