Trace Analysis

Download Report

Transcript Trace Analysis

First step into Trace Analysis
What is Trace

Measurement data from real world
networks



Wired networks: netflow traces
Wireless networks: Association trace,
encouter trace……
More general traces which represent other
types of networks: GPS trace (Cabspoting)
Different types of Traces

Encounter traces




The Intel/Cambridge Haggle/Pocket Switch
Network project
The U of Toronto PDA-based encounter
experiments
Your own encounter trace
Cellphone traces

MIT Reality Mining: encounter, location of
users (by cellphone tower/bluetooth), call
log
Different types of Traces

WLAN traces


UF traces, USC traces, Dartmouth
Vehicular traces

Cabspotting
Format of UF WLAN trace


The format shown below is not the
format from raw trace data
Association Trace


<time of the event in seconds> <Access
Point> <Event> <MAC>
Login Trace

<Time of the event in seconds>
<Gateway> LOGIN <MAC> <Username>
<Session ID>
Format of UF WLAN trace

Logout trace

<Time of the event in seconds>
<Gateway> LOGOUT <MAC>
<Username> <Session ID> <duration of
session in seconds> <bytes_in>
<bytes_out> <packet_in> <packet_out>
The TRACE framework
MobiLib
Trace
Characterize
(Cluster)
x1,1  x1,n
  
xt ,1  xt ,n
Represent
Analyze
Employ
(Modeling & Protocol Design)
Analyze the trace



You should have your own perspective
about what to investigate
Make sure that the trace itself or
together with some other possible
resource can provide enough
information you need
Decide a scheme to parse the trace or
decide what kind of tools(database…)
to use to get the information out of
trace in your desired format
(representation)
Analyze the trace


Now, its time to sit down and extract
useful information from the trace!
Then, you already convert the trace into
a special representation or format. Try
to identify a way to analyze it, many
possibilities
Example

Study the daily user flow relationship
among locations



From the association trace, we can build a
network among all the building around
campus
If there is a user which first associates with
one AP in Building A and then go to
Building B and make another association,
we draw an edge between A and B
The weight of the edge donates the
number of users transition from A to B in a
day
Cont

Representation


Matrix with (a,b) donates the outflux from
A to B
Then process the trace and populate
the entries of the matrix, in the same
run you may also want to get some
other details (lags, sequence….)
Cont


Get your results
Analyze it with any software, algorithm
you want
Access Points Syslogs

Users are reported by MAC addresses




When they associate with a AP
When they disaccosiate from a AP
When they roam away from a AP
When some other event happens (error in
packet checksum, max retry for a packet
reached, etc.)
Authentication server syslogs

The authentication server reports the
following events




DHCP lease – IP xxx is given to MAC yyy
User log in – User Gatorlink-ID logs in from
MAC yyy
User log out – User Gatorlink-ID logs out,
and it has been online for time ttt,
sent/received bbb bytes
Every 30 minutes, each online user is
reported for its traffic usage in the past 30
mins
Tricks of Trace Processing

Identify a common format that you can
convert multiple traces into


I use one file for each user, within each file, each
line represents “time location duration”
Abuse your hard drive

Keep intermediate results if they take long time to
generate.... You will thank your former self years
after you generated those files