Context-Enhanced Service Provisioning in Wireless Networks



Similar documents
Introduction Chapter 1. Uses of Computer Networks

CWNA Instructor Led Course Outline

Cisco Wireless Control System (WCS)

Best Practices for Deploying Wireless LANs

WLAN Positioning Technology White Paper

CISCO WIRELESS CONTROL SYSTEM (WCS)

Chapter 7 Low-Speed Wireless Local Area Networks

The All-in-One, Intelligent WLAN Controller

Using RMON to Manage Remote Networks Gilbert Held

Auditing the LAN with Network Discovery

WiNG5 CAPTIVE PORTAL DESIGN GUIDE

Remote Monitoring and Controlling System Based on ZigBee Networks

HP Location Aware. Datacon, HP Retail Solutions Christian F. Dupont / October 14, 2014

D-View 7 Network Management System

Chapter 4 Management. Viewing the Activity Log

Research Article Volume 6 Issue No. 4

ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3

Deploying Cisco Basic Wireless LANs WDBWL v1.1; 3 days, Instructor-led

1Y0-250 Implementing Citrix NetScaler 10 for App and Desktop Solutions Practice Exam

IST STREP Project. Deliverable D3.3.1u Middleware User s Guide Multi-Radio Device Management Layer.

SOA REFERENCE ARCHITECTURE: WEB TIER

Chapter 4 Managing Your Network

secupass

3-Tier Architecture. 3-Tier Architecture. Prepared By. Channu Kambalyal. Page 1 of 19

The Wireless Library Technical and Organisatorial Aspects

NWA1120 Series. User s Guide. Quick Start Guide. Wireless LAN Ceiling Mountable PoE Access Point. Default Login Details

Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches

Deploy WiFi Quickly and Easily

Deploying the ShoreTel IP Telephony Solution with a Meru Networks Wireless LAN

VEHICLE TRACKING SYSTEM USING GPS. 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune. 2 Asst. Professor, SCOE, Vadgaon, Pune

Avaya WLAN Orchestration System

Architecture of a Platform for Building Context-Aware Educational Mobile Services

[Asterisk IP Telephony Solutions]

Access to GSM and GPRS mobile services over unlicensed spectrum technologies through UMA

Chapter 3 Management. Remote Management

Nokia Call Connect v1.1 for Cisco User s Guide. Part Number: N Rev 003 Issue 1

Detection of illegal gateways in protected networks

Building Web-based Infrastructures for Smart Meters

United States Trustee Program s Wireless LAN Security Checklist

A Survey Study on Monitoring Service for Grid

Cisco WAP4410N Wireless-N Access Point: PoE/Advanced Security. Cisco Small Business Access Points

The All-in-one Guest Access Solution of Tomorrow, Delivered Today

Client/server is a network architecture that divides functions into client and server

Using Mobiles for On Campus Location Tracking

Software Development Kit

Throughput Maximization in Wireless LAN with Load Balancing Approach and Cell Breathing

Cisco Context-Aware Mobility Solution: Put Your Assets in Motion

Example Network Design Report

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Ruckus Wireless SmartZone Controller. What s New in Release 3.2

Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis

Distributed Configuration and Load Balancing in Wireless Networks

Product Specifications

BYOD: BRING YOUR OWN DEVICE.

The All-in-one Guest Access Solution of Tomorrow, Delivered Today

DEPLOYMENT GUIDE DEPLOYING THE BIG-IP LTM SYSTEM WITH MICROSOFT WINDOWS SERVER 2008 TERMINAL SERVICES

Chapter 6 Using Network Monitoring Tools

Link Layer and Network Layer Security for Wireless Networks

DEPLOYMENT GUIDE Version 1.2. Deploying F5 with Oracle E-Business Suite 12

Interlink Networks Secure.XS and Cisco Wireless Deployment Guide

UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE

Design Document. Offline Charging Server (Offline CS ) Version i -

Verizon Remote Access User Guide

Understanding Web personalization with Web Usage Mining and its Application: Recommender System

Keywords LBS, Continuous Query, Range Query, Google API s, GPS.

Cisco WAP4410N Wireless-N Access Point: PoE/Advanced Security Cisco Small Business Access Points

SERVICE DISCOVERY AND MOBILITY MANAGEMENT

Cisco Physical Access Manager

Computer Networking: A Survey

HARTING Ha-VIS Management Software

Gateway Service for Integration of Heterogeneous Networks using Different Interworking Solutions

Testing a Wireless LAN

Distributed Systems. Security concepts; Cryptographic algorithms; Digital signatures; Authentication; Secure Sockets

NETOP SUITE NETOP POLICY MANAGER (PM)

Context Model Based on Ontology in Mobile Cloud Computing

Cisco on Cisco Best Practices Cisco Wireless LAN Design

PREMIER PAS OF MOBILE INTERNET BUSINESS: A SURVEY RESEARCH ON MOBILE INTERNET SERVICE

Setting Up Your Personally- Owned Computer

TotalCloud Phone System

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

How To Set Up Foglight Nms For A Proof Of Concept

THE CHALLENGE OF ADMINISTERING WEBSITES OR APPLICATIONS THAT REQUIRE 24/7 ACCESSIBILITY

Nomadic Positioning Services for a Mobile Services Platform

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

Municipal Mesh Network Design

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

Transcription:

TWELVE PROJECT 1 Context-Enhanced Service Provisioning in Wireless Networks Mauro Brunato Department of Computer Science and Telecommunications, Università di Trento Via Sommarive 14, I-38050 Trento Italy brunato@dit.unitn.it Abstract We describe a context-aware architecture under development at the Department of Computer Science and Telecommunications of the University of Trento. The middleware system described in this report can integrate various data about the user and his/her context (e.g., position) and provide them in a transparent and system-independent way via a SOAP interface to dynamic web pages and other client applications. The main components of the architecture are described, and the main development choices are motivated. I. INTRODUCTION While wireless local area networks (WLANs) are becoming ubiquitous, and promises of always-on networking become more and more realistic, the main feature of these communications media, i.e. user mobility, is often underused. This fact differentiates WLAN access networks from cellular phone systems, where the user s ability to move while communicating is a key factor. WLANs, on the contrary, are mainly used from the desktop, as a cheap cable replacement. In spite of this fact, there is a growing belief that wireless systems can easily provide an additional value to common network usage. Beyond the ability to freely move while staying connected, with some limits due to the roaming difficulties of Wi-Fi systems, the system s ability to infer the user s (possibly changing) location can result in many innovative services [1], [2]. In this report we describe a middleware architecture that enables high-level services to take into account the user s context, in particular his position. This report is structured as follows: in Section II we provide an overview of the system components and the overall architecture; in Section III we describe how context data (user location) can be retrieved by the system. In Section IV we briefly describe an experimental context-aware service based on this architecture. II. CONTEXT-AWARE ARCHITECTURE The Uni-Fy AAA platform [3], [4] deployed at the CS department enables network managers to fully exploit new services that take advantage of context information. Such services can provide additional benefits to wireless users, promoting mobility and helping network operators and researchers to collect usage data. A sample system, aimed at providing context data (in particular location) to user applications at the Faculty of Science of the University of Trento, is described in Figure 1. The system is structured into three layers: network, middleware and application. The network, at the bottom of the picture, is the collection of all networking equipment, in particular devices related to wireless access: APs, AAA gateways and mobile clients. We only consider components that are context-aware, in the sense that they are able to provide some information that helps to build context representations. For instance, APs usually provide association information that can be used to estimate clients posiitons; clients, on the other hand, may optionally localize themselves by means of specialized hardware (GPS receivers, RFID tags) or by exploiting radio properties of the wireless medium; the AAA gateway can complement location data with the identity of the users, their traffic and time since login. The context broker is the main component of our architecture. Its purpose is to obtain context data by correlating information obtained by polling network devices and provide coherent context information to applications. It is composed of two logically separate components: the context database and the middleware service. The first basically contains a database of context information about users. Currently, time, identity and location data are considered. Such data are built by an application that receives information from network devices by using a mixture of methods, including SNMP polling and Syslog trapping (see Section III for a description of methods); data are matched by common tags (for instance, APs and the AAA gateway both report IEEE802 MAC addresses, while client applications use IP addresses that are also known by the AAA gateway). Currently, user locations are inferred in an asynchronous manner. In fact, active logging functionalities of some AP models have been found to be unreliable (particularly on earlier models), so users are not always localized as soon as they connect, but shortly thereafter by a polling cycle. Information stored in the database is not directly accessed by applications. A middleware service is interposed in order to provide a standard protocol for querying, independence from the DB representation and additional functions such as location tracking, confidence estimates, search functions or integration with user profile information. The service is implemented as a SOAP Java servlet, thus appearing as a standard web service to upper layer applications.

2 TWELVE PROJECT Application service Client applications Application layer Other HTTP Custom Web client Custom Context broker SOAP Servlet HTTP Middleware service Polling and matching Network AP ESS AAA server Fig. 1. Block diagram of the context-enhanced service framework http://laica.science.unitn.it:8082/axis/services/infoclients?method=getlastbyip&in0=172.31.194.155 Fig. 2. A query URL. Finally, in the application layer (upper part of Figure 1) several types of user services can be found. The context middleware can be queried by a web server running a (PHP, ASP, JSP, CGI) script, by some other application service, or by context-aware custom applications that connect directly to the middleware layer. A. Access to middleware services Communication between the middleware components and network devices is strongly hardware-dependent and uses a variety of synchronous and asynchronous methods, some of which shall be detailed in Section III; one of the middleware s purposes is to hide this complexity from the user by presenting a common interface. The choice of SOAP as the query protocol is motivated both by the availability of soap-enabled libraries for most languages (the web service is implemented in Java, test clients have been written in PHP) and the ability of testing the service s functionalities by using a common browser. Figure 2 shows the URL used to query the sample system about the last occurrence of a given IP. The corresponding answer is provided in Figure 3: the MAC address the IP was last assigned to (the six initial octets of the line within tag getbyipreturn) is shown; response fields are separated by pipe symbols, and the third field denotes the code of the associated AP. A list of available methods is given in Table I. The currenttime query is provided for synchronization; the getbyip query returns information about all clients that have been assigned a given IP address, and is mostly used for debugging. The getlastbyip command returns data about the last occurrence of a given IP address, as shown in the previous example. The numclients command asks data about the current load of an AP. Finally, method setcoord lets a client force its own (x, y) coordinates, provided that the client has some technique for inferring them. III. CLIENT LOCALIZATION Client devices such as laptops, smartphones and PDAs can be located by means of several different mechanisms. Since the TWELVE project is oriented towards IEEE802.11 networks, we are not considering custom localization techniques (GPS, RFID or ultrasonic transceivers): localization shall be therefore provided at no additional cost by the networking equipment, either with cell granularity or by finer estimation methods.

TWELVE PROJECT 3 <soapenv:envelope> <soapenv:body> <getlastbyipresponse soapenv:encodingstyle="..."> <getlastbyipreturn xsi:type="soapenc:string"> 00 13 CE 1B 00 3E 172.31.194.155 4 Mickey Mouse mickey@unitn.it 0 0 20 2006-05-10 13:26.06 </getlastbyipreturn> </getlastbyipresponse> </soapenv:body> </soapenv:envelope> Fig. 3. Response to the getlastbyip query. TABLE I INFOCLIENTS QUERIES. Method currenttime getbyip getlastbyip numclients setcoord Action Get the server s time. Get clients who have been detected to use a particular IP address. Get the last client who has been detected to use a particular IP address Get the number of clients associated to a given AP. Force the client s coordinates. A. Cell granularity In order to be connected to the network, a mobile terminal needs to be associated to an access point. Association is always client-driven, and a client shall usually choose the AP having the highest SNR with respect to its location. The assumption that a client associates to the nearest AP (or, more generally, that it is possible to assign to each AP a specific association domain in the physical space with little overlap to neighboring APs) is therefore reasonable most of the times. Some APs offer a load-balancing feature that allows them to refuse clients, forcing them to associate to farther APs with a lower load; however, this feature is useful only where AP density is high; thus, we can easily assume that the position of the associated AP is a good estimate of the mobile terminal s position, with an average error within a few tens of meters. The basic form of client localization is therefore implemented just by looking which access point the mobile terminal is associated to. Most APs provide functions that enable authorized parties to discover which clients are associated at a given time. The four main techniques are described in Figure 4. 1) Asynchronous polling: The simplest case, requiring almost no configuration on the AP side, is just asynchronous polling (Figure 4, part a). The context database periodically polls all databases by a common network administration protocol such as SNMP; all APs, in turn, provide an updated list of associated client, usually identified by ther interface s MAC address. 2) Syslog notifications: Most APs can also be configured to send appropriate Syslog notifications when some classes of events occur (Figure 4, part b). The context database IP address must be inserted in the AP configuration; since most APs consider association as a low-priority event, APs must be instructed to send non-crucial notification. One drawback of the system is that syslog packets do not require acknowledgments, so notifications may be lost. This problem can be overcome by the RADIUS authorization method. 3) RADIUS authorization: Many APs also provide some MAC-based authorization functionalities (Figure 4, part c): before accepting a client s association, an AP may check its MAC address against a RADIUS server s list. The context database can operate as a RADIUS server by sending authorization answers to such queries, while recording them. If MAC-based authorization is not required, the RADIUS server forges positive answers regardless of the request. This method is less elegant with respect to Syslog notification, because it makes use of a functionality (MAC-based authentication) for different purposes, but it overcomes the possible loss of information discussed in the previous paragraph; a missing RADIUS authorization shall force the AP to reissue the request, thus operating as an implicit ARQ mechanism. 4) Client notification: A specialized client program can be placed in the mobile terminal. Most wireless interfaces provide an API allowing user-level applications to retrieve fundamental connection data such as the cell s ESSID and the AP s ID (usually a MAC address). The client program shall send relevant information to the context database when it detects a change in connection parameters, or even periodically. Installation of a custom application on a mobile terminal is often discouraging, but this method lets the user decide whether information should be sent or not, thus enabling a higher control of privacy. B. Fine-grained localization Wireless client hardware often provides useful information about the radio environment; many Wi-Fi cards provide APIs that enable client applications to obtain signal intensity data from all APs within range. These data can be issued as SNR levels in a standard unit of measure (such as decibels over one milliwatt, dbm) or in an arbitrary scale. Probing the radio environment can enable clients to infer a better estimate of their position, usually well below the cell-to-cell distance. Various research and deployment experiences [5], [6] prove the feasibility of this approach. Unfortunately, fine-grained localization has at least two drawbacks:

4 TWELVE PROJECT (a) Who s there? <list of clients> (b) New arrival! (c) Can he? Yes, he can. (d) I m here! Fig. 4. Different forms of location disclosure: (a) Asynchronous SNMP query by database; (b) Database informed as Syslog server; (c) Database informed as RADIUS authenticator; (d) Client s notification Fig. 5. Example of location-aware service developed by students at the University of Trento. A location map and a context-dependent poll are shown as sample services. commercial APs lack the capability of scanning the radio space in search of client signals, and adding this functionality would deteriorate their performance, therefore RSSI measurements are always client s responsibility; continuous probing for radio signals is a power demanding activity, which leads to faster battery draught in mobile equipment. Nonetheless, experimental client applications have been implemented for PDAs and laptops. IV. IMPLEMENTATION An example of context-aware service currently available at the University of Trento is shown in Figure 5. The captive-portal authentication mechanism implemented in the Uni-Fy access network [3] allows the system to offer the user a link to a local web page whose contents are tailored according to the user s identity, position and, possibly, preferences (either declared or inferred). The web page contains the current user s location, suggestions about the nearest available classroom, a poll system about university services, tools for the organization of student communities. Other envisioned services include the suggestion of less congested wireless locations, restaurant menu (for students nearby the cafeteria and only during lunch hours) and teacher availability. Another longer-term service will be a wireless video broadcasting system which shall be used to diffuse lectures and talks to students. The system shall take advantage of a mixture of coding techniques in order to ensure good video quality even in the case of high packet loss ratio, while offering optimum performance to properly positioned clients. V. CONCLUSIONS This report describes ongoing activity at the Department of Computer Science and Telecommunications of the University of Trento.

TWELVE PROJECT 5 The context-enhanced service is articulated in a low-level interaction between a context broker, which asynchronously polls or receives notifications from access points and other hardware, and a high-level web service for providing context data to dynamic web pages and client applications. Different solutions are possible for client localization. A sample web-based application has also been developed. VI. ACKNOWLEDGMENTS Many thanks to Stefano Sgorlon, Paolo Toldo and Jonny Fox for implementing various parts of the system as parts of their stage and thesis activities. This work has been supported by the Italian Ministry for University and Research (MIUR) under the PRIN Project TWELVE (http://twelve.unitn.it/). REFERENCES [1] M. Brunato and R. Battiti, PILGRIM: A location broker and mobility-aware recommendation system, in Proc. PerCom 2003, S. Das, Ed. IEEE Computer Society, 2003, pp. 265 272. [2], A location-dependent recommender system for the web, in Proc. MobEA 2003, 2003. [3] M. Brunato and D. Severina, WilmaGate: a new open access gateway for hotspot management, in Proc. Third ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots, S. Choi, M. M. Buddhikot, and R. A. L. Cigno, Eds. ACM Press, 2005, pp. 56 64. [4] D. Severina, M. Brunato, A. Ordine, and L. Veltri, UniWireless: a distributed open access network, in Proc. Fourth ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots, R. A. L. Cigno, A. Prasad, and S. Das, Eds. ACM Press, 2006, pp. 30 36. [5] P. Bahl and V. N. Padmanabhan, RADAR: An in-building RF-based user location and tracking system, in Proc. IEEE INFOCOM. IEEE Communications Society, 2000, pp. 775 784. [6] M. Brunato and R. Battiti, Statistical learning theory for location fingerprinting in wireless LANs, Computer Networks, vol. 47, no. 6, pp. 825 845, 2005.