BibTeX for papers by David Kotz; for complete/updated list see https://www.cs.dartmouth.edu/~kotz/research/papers.html @Article{camacho:networkmetrics-j, author = {Jos{\'{e}} Camacho and Katarzyna Wasielewska and Rasmus Bro and David Kotz}, title = {{Interpretable Learning in Multivariate Big Data Analysis for Network Monitoring}}, journal = {IEEE Transactions on Network and Service Management}, year = 2024, month = {June}, volume = 21, number = 3, pages = {2926--2943}, publisher = {IEEE}, copyright = {IEEE (open access)}, DOI = {10.1109/TNSM.2024.3368501}, URL = {https://www.cs.dartmouth.edu/~kotz/research/camacho-networkmetrics-j/index.html}, abstract = {There is an increasing interest in the development of new data-driven models useful to assess the performance of communication networks. For many applications, like network monitoring and troubleshooting, a data model is of little use if it cannot be interpreted by a human operator. In this paper, we present an extension of the Multivariate Big Data Analysis (MBDA) methodology, a recently proposed interpretable data analysis tool. In this extension, we propose a solution to the automatic derivation of features, a cornerstone step for the application of MBDA when the amount of data is massive. The resulting network monitoring approach allows us to detect and diagnose disparate network anomalies, with a data-analysis workflow that combines the advantages of interpretable and interactive models with the power of parallel processing. We apply the extended MBDA to two case studies: UGR'16, a benchmark flow-based real-traffic dataset for anomaly detection, and Dartmouth'18, the longest and largest Wi-Fi trace known to date.}, } @TechReport{camacho:networkmetrics-tr2, author = {Jos{\'{e}} Camacho and Rasmus Bro and David Kotz}, title = {{Interpretable Learning in Multivariate Big Data Analysis for Network Monitoring}}, institution = {arXiv}, year = 2023, month = {April}, number = {1907.02677}, copyright = {the authors}, URL = {https://www.cs.dartmouth.edu/~kotz/research/camacho-networkmetrics-tr2/index.html}, abstract = {There is an increasing interest in the development of new data-driven models useful to assess the performance of communication networks. For many applications, like network monitoring and troubleshooting, a data model is of little use if it cannot be interpreted by a human operator. In this paper, we present an extension of the Multivariate Big Data Analysis (MBDA) methodology, a recently proposed interpretable data analysis tool. In this extension, we propose a solution to the automatic derivation of features, a cornerstone step for the application of MBDA when the amount of data is massive. The resulting network monitoring approach allows us to detect and diagnose disparate network anomalies, with a data-analysis workflow that combines the advantages of interpretable and interactive models with the power of parallel processing. We apply the extended MBDA to two case studies: UGR'16, a benchmark flow-based real-traffic dataset for anomaly detection, and Dartmouth'18, the longest and largest Wi-Fi trace known to date.}, } @InProceedings{martinez:poster, author = {Eduardo Antonio Ma{\~{n}}as-Mart{\'{\i}}nez and Elena Cabrera and Katarzyna Wasielewska and David Kotz and Jos{\'{e}} Camacho}, title = {{Mining social interactions in connection traces of a campus Wi-Fi network}}, booktitle = {{Proceedings of the SIGCOMM Poster and Demo Sessions}}, year = 2021, month = {August}, numpages = 3, pages = {6--8}, publisher = {ACM}, copyright = {ACM}, DOI = {10.1145/3472716.3472844}, URL = {https://www.cs.dartmouth.edu/~kotz/research/martinez-poster/index.html}, abstract = {Wi-Fi technologies have become one of the most popular means for Internet access. As a result, the use of mobile devices has become ubiquitous and instrumental for society. A device can be identified through its MAC address within an autonomous system. Although some devices attempt to anonymize MAC addresses via randomization, these techniques are not used once the device is associated to the network. As a result, device identification poses a privacy problem in large-scale (e.g., campus-wide) Wi-Fi deployments: if the mobile device can be located, the user who carries that device can also be located. In turn, location information leads to the possibility to extract private knowledge from Wi-Fi users, like social interactions, movement habits, and so forth. \par In this poster we report preliminary work in which we infer social interactions of individuals from Wi-Fi connection traces in the campus network at Dartmouth College. We make the following contributions: (i) we propose several definitions of a pseudocorrelation matrix from Wi-Fi connection traces, which measure similarity between devices or users according to their temporal association profile to the Access Points (APs); (ii) we evaluate the accuracy of these pseudo-correlation variants in a simulation environment; and (iii) we contrast results with those found on a real trace.}, } @Misc{gralla:inside-outside, author = {Paul Gralla}, title = {{An inside vs. outside classification system for Wi-Fi IoT devices}}, school = {Dartmouth Computer Science}, year = 2021, month = {June}, copyright = {the author}, address = {Hanover, NH}, URL = {https://www.cs.dartmouth.edu/~kotz/research/gralla-inside-outside/index.html}, note = {Undergraduate Thesis}, abstract = {We are entering an era in which Smart Devices are increasingly integrated into our daily lives. Everyday objects are gaining computational power to interact with their environments and communicate with each other and the world via the Internet. While the integration of such devices offers many potential benefits to their users, it also gives rise to a unique set of challenges. One of those challenges is to detect whether a device belongs to one's own ecosystem, or to a neighbor -- or represents an unexpected adversary. An important part of determining whether a device is friend or adversary is to detect whether a device's location is within the physical boundaries of one's space (e.g. office, classroom, home). In this thesis we propose a system that is able to decide with 82\% accuracy whether the location of an IoT device is inside or outside of a defined space based on a small number of transmitted Wi- Fi frames. The classification is achieved by leveraging a machine-learning classifier trained and tested on RSSI data of Wi-Fi transmissions recorded by three or more observers. In an initialization phase the classifier is trained by the user on Wi-Fi transmissions of a variety of locations, inside (and outside). The system can be built with off-the-shelf Wi-Fi observing devices that do not require any special hardware modifications. With the exception of the training period, the system can accurately classify the indoor/outdoor state of target devices without any cooperation from the user or from the target devices.}, } @InProceedings{camacho:networkmetrics, author = {Jos{\'{e}} Camacho and Rasmus Bro and David Kotz}, title = {{Automatic Learning coupled with Interpretability: MBDA in Action}}, booktitle = {{Proceedings of the Network Traffic Measurement and Analysis Conference (TMA)}}, year = 2020, month = {June}, publisher = {IFIP}, copyright = {European Union}, ISBN13 = {978-3-903176-27-0}, URL = {https://www.cs.dartmouth.edu/~kotz/research/camacho-networkmetrics/index.html}, abstract = {In this paper, we illustrate the application of Multivariate Big Data Analysis (MBDA), a recently proposed interpretable machine-learning method with application to Big Data sets. We apply MBDA for the first time for the detection and troubleshooting of network problems in a campus-wide Wi-Fi network. Data includes a seven-year trace (from 2012 to 2018) of the network's most recent activity, with approximately 3,000 distinct access points, 40,000 authenticated users, and 600,000 distinct Wi-Fi stations. This is the longest and largest Wi-Fi trace known to date. Furthermore, we propose a new feature-learning procedure that solves an inherent limitation in MBDA: the manual definition of the features. The extended MBDA results in a methodology that allows network analysts to identify problems and diagnose them, which are principal tasks to troubleshoot the network and optimize its performance. In the paper, we go through the entire workflow of the approach, illustrating its application in detail and discussing processing times.}, } @Article{camacho:longitudinal, author = {Jos{\'{e}} Camacho and Chris McDonald and Ron Peterson and Xia Zhou and David Kotz}, title = {{Longitudinal analysis of a campus Wi-Fi network}}, journal = {Computer Networks}, year = 2020, month = {April}, day = 7, volume = 107, articleno = 107103, numpages = 15, publisher = {Elsevier}, copyright = {Elsevier}, ISSN = {1389-1286}, DOI = {10.1016/j.comnet.2020.107103}, URL = {https://www.cs.dartmouth.edu/~kotz/research/camacho-longitudinal/index.html}, abstract = {In this paper we describe and characterize the largest Wi-Fi network trace ever published: spanning seven years, approximately 3000 distinct access points, 40,000 authenticated users, and 600,000 distinct Wi-Fi stations. The 7TB of raw data are pre-processed into connection sessions, which are made available for the research community. We describe the methods used to capture and process the traces, and characterize the most prominent trends and changes during the seven-year span of the trace. Furthermore, this Wi-Fi network covers the campus of Dartmouth College, the same campus detailed a decade earlier in seminal papers about that network and its users' network behavior. We thus are able to comment on changes in patterns of usage, connection, and mobility in Wi-Fi deployments.}, } @TechReport{camacho:networkmetrics-tr, author = {Jos{\'{e}} Camacho and Rasmus Bro and David Kotz}, title = {{Networkmetrics unraveled: MBDA in Action}}, institution = {arXiv}, year = 2019, month = {July}, number = {1907.02677}, copyright = {the authors}, URL = {https://www.cs.dartmouth.edu/~kotz/research/camacho-networkmetrics-tr/index.html}, abstract = {Networkmetrics is a new term that refers to the data-driven approach for monitoring, troubleshooting and understanding communication networks using multivariate analysis. Networkmetric models are powerful machine learning tools to interpret and interact with data collected from a network. In this paper, we illustrate the application of Multivariate Big Data Analysis (MBDA), a recently proposed networkmetric method with application to Big Data sets. We use MBDA for the detection and troubleshooting of network problems in a campus-wide Wi-Fi network. Data includes a seven-year trace (from 2012 to 2018) of the network's most recent activity, with approximately 3,000 distinct access points, 40,000 authenticated users, and 600,000 distinct Wi-Fi stations. This is the longest and largest Wi-Fi trace known to date. To analyze this data, we propose learning and visualization procedures that extend MBDA. This results in a methodology that allows network analysts to identify problems and diagnose and troubleshoot them, optimizing the network performance. In the paper, we go through the entire workflow of the approach, illustrating its application in detail and discussing processing times in parallel hardware.}, } @Article{henderson:jvoice, author = {Tristan Henderson and David Kotz and Ilya Abyzov}, title = {{The Changing Usage of a Mature Campus-wide Wireless Network}}, journal = {Computer Networks}, year = 2008, month = {October}, volume = 52, number = 14, pages = {2690--2712}, publisher = {Elsevier}, copyright = {Elsevier}, DOI = {10.1016/j.comnet.2008.05.003}, URL = {https://www.cs.dartmouth.edu/~kotz/research/henderson-jvoice/index.html}, abstract = {Wireless Local Area Networks (WLANs) are now commonplace on many academic and corporate campuses. As ``Wi-Fi'' technology becomes ubiquitous, it is increasingly important to understand trends in the usage of these networks. This paper analyzes an extensive network trace from a mature 802.11 WLAN, including more than 550 access points and 7000 users over seventeen weeks. We employ several measurement techniques, including syslog messages, telephone records, SNMP polling and tcpdump packet captures. This is the largest WLAN study to date, and the first to look at a mature WLAN. We compare this trace to a trace taken after the network's initial deployment two years prior. \par We found that the applications used on the WLAN changed dramatically, with significant increases in peer-to-peer and streaming multimedia traffic. Despite the introduction of a Voice over IP (VoIP) system that includes wireless handsets, our study indicates that VoIP has been used little on the wireless network thus far, and most VoIP calls are made on the wired network. \par We saw greater heterogeneity in the types of clients used, with more embedded wireless devices such as PDAs and mobile VoIP clients. We define a new metric for mobility, the ``session diameter''. We use this metric to show that embedded devices have different mobility characteristics than laptops, and travel further and roam to more access points. Overall, users were surprisingly non-mobile, with half remaining close to home about 98\% of the time.}, } @InCollection{henderson:measuring, author = {Tristan Henderson and David Kotz}, title = {{Measuring Wireless LANs}}, booktitle = {{Mobile, Wireless and Sensor Networks: Technology, Applications and Future Directions}}, editor = {Rajeev Shorey and Akkihebbal L. Ananda and Mun Choon Chan and Wei Tsang Ooi}, year = 2006, chapter = 1, pages = {5--27}, publisher = {John Wiley \& Sons}, copyright = {John Wiley \& Sons}, ISBN13 = 9780471755593, address = {New York, NY}, DOI = {10.1002/0471755591.ch1}, URL = {https://www.cs.dartmouth.edu/~kotz/research/henderson-measuring/index.html}, abstract = {Wireless local area networks have become increasingly popular in recent years, and are now commonplace in many venues, including academic and corporate campuses, residences, and ``hotspots'' in public areas. It is important to understand how these wireless LANs are used, both for deploying networks, and for the development of future wireless networking protocols and applications. \par In this chapter we discuss the measurement and analysis of the popular 802.11 family of wireless LANs. We describe the tools, metrics and techniques that are used to measure wireless LANs. The results of existing measurement studies are surveyed. We illustrate some of the problems that are specific to measuring wireless LANs, and outline some challenges for collecting future wireless traces.}, } @InProceedings{henderson:esm, author = {Tristan Henderson and Denise Anthony and David Kotz}, title = {{Measuring wireless network usage with the experience sampling method}}, booktitle = {{Proceedings of the Workshop on Wireless Network Measurements (WiNMee)}}, year = 2005, month = {April}, numpages = 6, publisher = {International Communications Sciences and Technology Association (ICST)}, copyright = {International Communications Sciences and Technology Association (ICST)}, ISBN = {0-9767294-0-7}, URL = {https://www.cs.dartmouth.edu/~kotz/research/henderson-esm/index.html}, abstract = {Measuring wireless local area networks has proven useful for characterizing, modeling and provisioning these networks. These measurements are typically taken passively from a vantage point on the network itself. Client devices, or users, are never actively queried. These measurements can indicate \emph{what} is happening on the network, but it can be difficult to infer \emph{why} a particular behavior is occurring. In this paper we use the Experience Sampling Method (ESM) to study wireless network users. We monitored 29 users remotely for one week, and signaled them to fill out a questionnaire whenever interesting wireless behavior was observed. We find ESM to be a useful method for collecting data about wireless network usage that cannot be provided by network monitoring, and we present a list of recommendations for network researchers who wish to conduct an ESM study.}, } @Article{kotz:jcampus, author = {David Kotz and Kobby Essien}, title = {{Analysis of a Campus-wide Wireless Network}}, journal = {Wireless Networks}, year = 2005, month = {January}, volume = 11, number = {1--2}, pages = {115--133}, publisher = {Springer}, copyright = {Springer Science and Business Media}, DOI = {10.1007/s11276-004-4750-0}, URL = {https://www.cs.dartmouth.edu/~kotz/research/kotz-jcampus/index.html}, abstract = {Understanding usage patterns in wireless local-area networks (WLANs) is critical for those who develop, deploy, and manage WLAN technology, as well as those who develop systems and application software for wireless networks. This paper presents results from the largest and most comprehensive trace of network activity in a large, production wireless LAN. For eleven weeks we traced the activity of nearly two thousand users drawn from a general campus population, using a campus-wide network of 476 access points spread over 161 buildings at Dartmouth College. Our study expands on those done by Tang and Baker, with a significantly larger and broader population. \par We found that residential traffic dominated all other traffic, particularly in residences populated by newer students; students are increasingly choosing a wireless laptop as their primary computer. Although web protocols were the single largest component of traffic volume, network backup and file sharing contributed an unexpectedly large amount to the traffic. Although there was some roaming within a network session, we were surprised by the number of situations in which cards roamed excessively, unable to settle on one access point. Cross-subnet roams were an especial problem, because they broke IP connections, indicating the need for solutions that avoid or accommodate such roams.}, } @TechReport{henderson:voice-tr, author = {Tristan Henderson and David Kotz and Ilya Abyzov}, title = {{The Changing Usage of a Mature Campus-wide Wireless Network}}, institution = {Dartmouth Computer Science}, year = 2004, month = {March}, number = {TR2004-496}, copyright = {the authors}, URL = {https://www.cs.dartmouth.edu/~kotz/research/henderson-voice-tr/index.html}, abstract = {Wireless Local Area Networks (WLANs) are now common on academic and corporate campuses. As ``Wi-Fi'' technology becomes ubiquitous, it is increasingly important to understand trends in the usage of these networks. This paper analyzes an extensive network trace from a mature 802.11 WLAN, including more than 550 access points and 7000 users over seventeen weeks. We employ several measurement techniques, including syslogs, telephone records, SNMP polling and tcpdump packet sniffing. This is the largest WLAN study to date, and the first to look at a large, mature WLAN and consider geographic mobility. We compare this trace to a trace taken after the network's initial deployment two years ago. \par We found that the applications used on the WLAN changed dramatically. Initial WLAN usage was dominated by Web traffic; our new trace shows significant increases in peer-to-peer, streaming multimedia, and voice over IP (VoIP) traffic. On-campus traffic now exceeds off-campus traffic, a reversal of the situation at the WLAN's initial deployment. Our study indicates that VoIP has been used little on the wireless network thus far, and most VoIP calls are made on the wired network. Most calls last less than a minute. \par We saw more heterogeneity in the types of clients used, with more embedded wireless devices such as PDAs and mobile VoIP clients. We define a new metric for mobility, the ``session diameter.'' We use this metric to show that embedded devices have different mobility characteristics than laptops, and travel further and roam to more access points. Overall, users were surprisingly non-mobile, with half remaining close to home about 98\% of the time.}, } @InProceedings{henderson:voice, author = {Tristan Henderson and David Kotz and Ilya Abyzov}, title = {{The Changing Usage of a Mature Campus-wide Wireless Network}}, booktitle = {{Proceedings of the ACM International Conference on Mobile Computing and Networking (MobiCom)}}, year = 2004, month = {September}, pages = {187--201}, publisher = {ACM}, copyright = {ACM}, DOI = {10.1145/1023720.1023739}, URL = {https://www.cs.dartmouth.edu/~kotz/research/henderson-voice/index.html}, abstract = {Wireless Local Area Networks (WLANs) are now commonplace on many academic and corporate campuses. As ``Wi-Fi'' technology becomes ubiquitous, it is increasingly important to understand trends in the usage of these networks. \par This paper analyzes an extensive network trace from a mature 802.11 WLAN, including more than 550 access points and 7000 users over seventeen weeks. We employ several measurement techniques, including syslogs, telephone records, SNMP polling and tcpdump packet sniffing. This is the largest WLAN study to date, and the first to look at a large, mature WLAN and consider geographic mobility. We compare this trace to a trace taken after the network's initial deployment two years ago. \par We found that the applications used on the WLAN changed dramatically. Initial WLAN usage was dominated by Web traffic; our new trace shows significant increases in peer-to-peer, streaming multimedia, and voice over IP (VoIP) traffic. On-campus traffic now exceeds off-campus traffic, a reversal of the situation at the WLAN's initial deployment. Our study indicates that VoIP has been used little on the wireless network thus far, and most VoIP calls are made on the wired network. Most calls last less than a minute. \par We saw greater heterogeneity in the types of clients used, with more embedded wireless devices such as PDAs and mobile VoIP clients. We define a new metric for mobility, the ``session diameter.'' We use this metric to show that embedded devices have different mobility characteristics than laptops, and travel further and roam to more access points. Overall, users were surprisingly non-mobile, with half remaining close to home about 98\% of the time.}, } @TechReport{newport:thesis, author = {Calvin Newport}, title = {{Simulating mobile ad hoc networks: a quantitative evaluation of common MANET simulation models}}, institution = {Dartmouth Computer Science}, year = 2004, month = {June}, number = {TR2004-504}, copyright = {the author}, address = {Hanover, NH}, URL = {https://www.cs.dartmouth.edu/~kotz/research/newport-thesis/index.html}, note = {Available as Dartmouth Computer Science Technical Report TR2004-504}, abstract = {Because it is difficult and costly to conduct real-world mobile ad hoc network experiments, researchers commonly rely on computer simulation to evaluate their routing protocols. However, simulation is far from perfect. A growing number of studies indicate that simulated results can be dramatically affected by several sensitive simulation parameters. It is also commonly noted that most simulation models make simplifying assumptions about radio behavior. This situation casts doubt on the reliability and applicability of many ad hoc network simulation results. \par In this study, we begin with a large outdoor routing experiment testing the performance of four popular ad hoc algorithms (AODV, APRL, ODMRP, and STARA). We present a detailed comparative analysis of these four implementations. Then, using the outdoor results as a baseline of reality, we disprove a set of common assumptions used in simulation design, and quantify the impact of these assumptions on simulated results. We also more specifically validate a group of popular radio models with our real-world data, and explore the sensitivity of various simulation parameters in predicting accurate results. We close with a series of specific recommendations for simulation and ad hoc routing protocol designers.}, } @TechReport{henderson:problems, author = {Tristan Henderson and David Kotz}, title = {{Problems with the Dartmouth wireless SNMP data collection}}, institution = {Dartmouth Computer Science}, year = 2003, month = {December}, number = {TR2003-480}, copyright = {the authors}, URL = {https://www.cs.dartmouth.edu/~kotz/research/henderson-problems/index.html}, abstract = {The original Dartmouth wireless network study used SNMP to query the college's Cisco 802.11b access points. The perl scripts that performed the SNMP queries suffered from some problems, in that they queried inappropriate SNMP values, or misunderstood the meaning of other values. This data was also used in a subsequent analysis. The same scripts were used to collect data for a subsequent study of another wireless network. This document outlines these problems and indicates which of the data collected by the original scripts may be invalid.}, } @TechReport{lee:thesis, author = {Clara Lee}, title = {{Persistence and Prevalence in the Mobility of Dartmouth Wireless Network Users}}, institution = {Dartmouth Computer Science}, year = 2003, month = {May}, number = {TR2003-455}, copyright = {the author}, address = {Hanover, NH}, URL = {https://www.cs.dartmouth.edu/~kotz/research/lee-thesis/index.html}, note = {The data in this paper is highly suspect; see TR2003-480. Available as Dartmouth Computer Science Technical Report TR2003-455}, abstract = {Wireless local-area networks (WLANs) are increasing in popularity. As more people use WLANs it is important to understand how these users behave. We analyzed data collected over three months of 2002 to measure the persistence and prevalence of users of the Dartmouth wireless network. \par We found that most of the users of Dartmouth's network have short association times and a high rate of mobility. This observation fits with the predominantly student population of Dartmouth College, because students do not have a fixed workplace and are moving to and from classes all day.}, } @TechReport{kotz:campus-tr, author = {David Kotz and Kobby Essien}, title = {{Characterizing Usage of a Campus-wide Wireless Network}}, institution = {Dartmouth Computer Science}, year = 2002, month = {March}, number = {TR2002-423}, copyright = {the authors}, URL = {https://www.cs.dartmouth.edu/~kotz/research/kotz-campus-tr/index.html}, abstract = {Wireless local-area networks (WLANs) are increasingly common, but little is known about how they are used. A clear understanding of usage patterns in real WLANs is critical information to those who develop, deploy, and manage WLAN technology, as well as those who develop systems and application software for wireless networks. This paper presents results from the largest and most comprehensive trace of network activity in a large, production wireless LAN. For eleven weeks we traced the activity of nearly two thousand users drawn from a general campus population, using a campus-wide network of 476 access points spread over 161 buildings. Our study expands on those done by Tang and Baker, with a significantly larger and broader population. \par We found that residential traffic dominated all other traffic, particularly in residences populated by newer students; students are increasingly choosing a wireless laptop as their primary computer. Although web protocols were the single largest component of traffic volume, network backup and file sharing contributed an unexpectedly large amount to the traffic. Although there was some roaming within a network session, we were surprised by the number of situations in which cards roamed excessively, unable to settle on one access point. Cross-subnet roams were an especial problem, because they broke IP connections, indicating the need for solutions that avoid or accommodate such roams.}, } @TechReport{kotz:campus-tr2, author = {David Kotz and Kobby Essien}, title = {{Analysis of a Campus-wide Wireless Network}}, institution = {Dartmouth Computer Science}, year = 2002, month = {September}, number = {TR2002-432}, copyright = {the authors}, URL = {https://www.cs.dartmouth.edu/~kotz/research/kotz-campus-tr2/index.html}, abstract = {Understanding usage patterns in wireless local-area networks (WLANs) is critical for those who develop, deploy, and manage WLAN technology, as well as those who develop systems and application software for wireless networks. This paper presents results from the largest and most comprehensive trace of network activity in a large, production wireless LAN. For eleven weeks we traced the activity of nearly two thousand users drawn from a general campus population, using a campus-wide network of 476 access points spread over 161 buildings. Our study expands on those done by Tang and Baker, with a significantly larger and broader population. \par We found that residential traffic dominated all other traffic, particularly in residences populated by newer students; students are increasingly choosing a wireless laptop as their primary computer. Although web protocols were the single largest component of traffic volume, network backup and file sharing contributed an unexpectedly large amount to the traffic. Although there was some roaming within a network session, we were surprised by the number of situations in which cards roamed excessively, unable to settle on one access point. Cross-subnet roams were an especial problem, because they broke IP connections, indicating the need for solutions that avoid or accommodate such roams.}, } @InProceedings{kotz:campus, author = {David Kotz and Kobby Essien}, title = {{Analysis of a Campus-wide Wireless Network}}, booktitle = {{Proceedings of the ACM International Conference on Mobile Computing and Networking (MobiCom)}}, year = 2002, month = {September}, pages = {107--118}, publisher = {ACM}, copyright = {ACM}, DOI = {10.1145/570645.570659}, URL = {https://www.cs.dartmouth.edu/~kotz/research/kotz-campus/index.html}, note = {Revised and corrected as Dartmouth CS Technical Report TR2002-432. Winner of ACM SIGMOBILE Test-of-Time award, 2017}, abstract = {Understanding usage patterns in wireless local-area networks (WLANs) is critical for those who develop, deploy, and manage WLAN technology, as well as those who develop systems and application software for wireless networks. This paper presents results from the largest and most comprehensive trace of network activity in a large, production wireless LAN. For eleven weeks we traced the activity of nearly two thousand users drawn from a general campus population, using a campus-wide network of 476 access points spread over 161 buildings. Our study expands on those done by Tang and Baker, with a significantly larger and broader population. \par We found that residential traffic dominated all other traffic, particularly in residences populated by newer students; students are increasingly choosing a wireless laptop as their primary computer. Although web protocols were the single largest component of traffic volume, network backup and file sharing contributed an unexpectedly large amount to the traffic. Although there was some roaming within a network session, we were surprised by the number of situations in which cards roamed excessively, unable to settle on one access point. Cross-subnet roams were an especial problem, because they broke IP connections, indicating the need for solutions that avoid or accommodate such roams.}, } @TechReport{mills:tettey-thesis, author = {G. Ayorkor Mills-Tettey}, title = {{Mobile Voice Over IP (MVOIP): An Application-level Protocol}}, institution = {Dartmouth Computer Science}, year = 2001, month = {June}, number = {TR2001-390}, copyright = {the author}, address = {Hanover, NH}, URL = {https://www.cs.dartmouth.edu/~kotz/research/mills-tettey-thesis/index.html}, note = {Available as Dartmouth Computer Science Technical Report TR2001-390}, abstract = {Current Voice over Internet Protocol (VOIP) protocols require participating hosts to have fixed IP addresses for the duration of a VOIP call. When using a wireless-enabled host, such as a tablet computer on an 802.11 wireless network, it is possible for a participant in a VOIP call to roam around the network, moving from one subnet to another and needing to change IP addresses. This address change creates the need for mobility support in VOIP applications. \par We present the design of Mobile Voice over IP (MVOIP), an application-level protocol that enables such mobility in a VOIP application based on the ITU H.323 protocol stack. An MVOIP application uses hints from the surrounding network to determine that it has switched subnets. It then initiates a hand-off procedure that comprises pausing its current calls, obtaining a valid IP address for the current subnet, and reconnecting to the remote party with whom it was in a call. Testing the system shows that on a Windows 2000 platform there is a perceivable delay in the hand-off process, most of which is spent in the Windows API for obtaining DHCP addresses. Despite this bottleneck, MVOIP works well on a wireless network.}, } @TechReport{stern:thesis, author = {Pablo Stern}, title = {{Measuring early usage of Dartmouth's wireless network}}, institution = {Dartmouth Computer Science}, year = 2001, month = {June}, number = {TR2001-393}, copyright = {the author}, address = {Hanover, NH}, URL = {https://www.cs.dartmouth.edu/~kotz/research/stern-thesis/index.html}, note = {Available as Dartmouth Computer Science Technical Report TR2001-393}, abstract = {In Spring 2001, Dartmouth College installed a campus-wide 802.11b wireless network. To understand how that network is used, we examined the usage characteristics of the network over a five-week period. We monitored access points to determine user behavior, and user and network traffic characteristics. Because our study coincided with the deployment of the access points, our analysis captures the growth of a wireless network. The results of this study help understand the behavior of mobile users and provide a reference to network engineers wishing to deploy and expand similar wireless networks.}, }