SlideShare a Scribd company logo
On Quality of Monitoring for Multi-channel Wireless Infrastructure
Networks
ABSTRACT:
Passive monitoring utilizing distributed wireless sniffers is an effective technique to monitor
activities in wireless infrastructure networks for fault diagnosis, resource management and
critical path analysis. In this paper, we introduce a quality of monitoring (QoM) metric defined
by the expected number of active users monitored, and investigate the problem of maximizing
QoM by judiciously assigning sniffers to channels based on the knowledge of user activities in
a multi-channel wireless network. Two types of capture models are considered. The user-centric
model assumes frame-level capturing capability of sniffers such that the activities of different
users can be distinguished while the sniffer-centric model only utilizes the binary channel
information (active or not) at a sniffer. For the user-centric model, we show that the implied
optimization problem is NP-hard, but a constant approximation ratio can be attained via
polynomial complexity algorithms. For the sniffer-centric model, we devise stochastic inference
schemes to transform the problem into the user-centric domain, where we are able to apply our
polynomial approximation algorithms. The effectiveness of our proposed schemes and
algorithms is further evaluated using both synthetic data as well as real-world traces from an
operational WLAN.
GLOBALSOFT TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
EXISTING SYSTEM:
There has been much work done on wireless monitoring from a system-level approach, in an
attempt to design complete systems, and address the interactions among the components of such
systems. The work uses AP, SNMP logs, and wired side traces to analyze WiFi traffic
characteristics.
DISADVANTAGES OF EXISTING SYSTEM:
 Ideally, a network administrator would want to perform network monitoring on all
channels simultaneously. However, multi-radio sniffers are known to be large and
expensive to deploy.
 The basic problem underlying all of our models can be cast as finding an assignment of
sniffers to channels so as to maximize the QoM.
 The problem of sniffer assignment, in an attempt to maximize the QoM metric, is further
complicated by the dynamics of real-life systems such as: 1) the user population changes
over time (churn), 2) activities of a single user is dynamic, and 3) connectivity between
users and sniffers may vary due to changes in channel conditions or mobility.
PROPOSED SYSTEM:
In this paper, we focus on designing algorithms that aim at maximizing the QoM metric with
different granularities of a priori knowledge. The usage patterns are assumed to be stationary
during the decision period. We make the following contributions toward the design of passive
monitoring systems for multi-channel wireless infrastructure networks. We provide a formal
model for evaluating the quality of monitoring. We study two categories of monitoring models
that differ in the information capturing capability of passive monitoring systems. For each of
these models we provide algorithms and methods that optimize the quality of monitoring. We
unravel interactions between the two monitoring models by devising two methods to convert
the sniffer-centric model to the user-centric domain by exploiting the stochastic properties of
underlying user processes
ADVANTAGES OF PROPOSED SYSTEM:
The first approach, Quantized Linear ICA (QLICA), estimates the hidden structure by applying
a quantization process on the outcome of the traditional ICA, while the second approach, Binary
ICA (BICA), decomposes the observation data into OR mixtures of hidden components and
recovers the underlying structure. Finally, an extensive evaluation study is carried out using
both synthetic data as well as real-world traces from an operational WLAN.
HARDWARE & SOFTWARE REQUIREMENTS:
HARDWARE REQUIREMENTS:
System : Pentium IV 2.4 GHz.
Hard Disk : 40 GB.
Floppy Drive : 1.44 Mb.
Monitor : 15 VGA Color.
Mouse : Logitech.
Ram : 512 MB.
SOFTWARE REQUIREMENTS:
Operating system : Windows XP Professional.
Coding Language : C#.NET
REFERENCE:
Huy Nguyen, Gabriel Scalosub and Rong Zheng,Senior Member, IEEE “On Quality of
Monitoring for Multi-channel Wireless Infrastructure Networks”- IEEE TRANSACTIONS
ON MOBILE COMPUTING, 2013.
On quality of monitoring for multi channel wireless infrastructure networks
CLOUING
DOMAIN: WIRELESS NETWORK PROJECTS

More Related Content

DOCX
On quality of monitoring for multi channel wireless infrastructure networks
PDF
On quality of monitoring for multi channel wireless
PDF
On quality of monitoring for multi
PPT
Mobi Sync
PPTX
ENSEIRB - Advanced Project
PPT
Handover Microsoft
DOCX
secured communication over wireless broadcast networks
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
On quality of monitoring for multi channel wireless infrastructure networks
On quality of monitoring for multi channel wireless
On quality of monitoring for multi
Mobi Sync
ENSEIRB - Advanced Project
Handover Microsoft
secured communication over wireless broadcast networks
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...

What's hot (20)

PDF
International Journal of Engineering Research and Development
PPTX
Data aggregation in wireless sensor networks
PDF
ENERGY EFFICIENT MULTIHOP QUALITY PATH BASED DATA COLLECTION IN WIRELESS SENS...
PDF
A fuzzy congestion controller to detect and balance congestion in wsn
PDF
Range-Based Data Gathering Algorithm With a Mobile Sink in Wireless Sensor Ne...
PDF
Dynamic Spectrum Allocation in Wireless sensor Networks
PDF
Study of admission and control system in a Centralized Cognitive Radio Network
DOCX
Mobi sync efficient time synchronization for mobile underwater sensor networks
PPTX
Energy Efficient Data Gathering Protocol in WSN
PDF
Energy Consumption Minimization in WSN using BFO
PDF
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
PDF
Byzantine Attack & Defense in Cognitive Radio Network
PDF
A Survey of Routing Protocols for Structural Health Monitoring
PDF
Implementation of a bpsk modulation based cognitive radio system using the en...
PDF
F04623943
PDF
Improvising Network life time of Wireless sensor networks using mobile data a...
DOCX
A historical beacon-aided localization algorithm for mobile sensor networks
PDF
Hybrid nearest neighbour and feed forward neural networks algorithm for indoo...
PDF
IRJET- Clustering Protocols in Wireless Sensor Network: A Review
PPTX
Wireless sensor network lifetime constraints
International Journal of Engineering Research and Development
Data aggregation in wireless sensor networks
ENERGY EFFICIENT MULTIHOP QUALITY PATH BASED DATA COLLECTION IN WIRELESS SENS...
A fuzzy congestion controller to detect and balance congestion in wsn
Range-Based Data Gathering Algorithm With a Mobile Sink in Wireless Sensor Ne...
Dynamic Spectrum Allocation in Wireless sensor Networks
Study of admission and control system in a Centralized Cognitive Radio Network
Mobi sync efficient time synchronization for mobile underwater sensor networks
Energy Efficient Data Gathering Protocol in WSN
Energy Consumption Minimization in WSN using BFO
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Byzantine Attack & Defense in Cognitive Radio Network
A Survey of Routing Protocols for Structural Health Monitoring
Implementation of a bpsk modulation based cognitive radio system using the en...
F04623943
Improvising Network life time of Wireless sensor networks using mobile data a...
A historical beacon-aided localization algorithm for mobile sensor networks
Hybrid nearest neighbour and feed forward neural networks algorithm for indoo...
IRJET- Clustering Protocols in Wireless Sensor Network: A Review
Wireless sensor network lifetime constraints
Ad

Viewers also liked (7)

DOCX
Distributed processing of probabilistic top k queries in wireless sensor netw...
DOCX
Participatory privacy enabling privacy in participatory sensing
DOCX
Dcim distributed cache invalidation method for maintaining cache consistency ...
DOCX
On the real time hardware implementation feasibility of joint radio resource ...
DOCX
Error tolerant resource allocation and payment minimization for cloud system
DOCX
Automatic semantic content extraction in videos using a fuzzy ontology and ru...
DOCX
Discovery and verification of neighbor positions in mobile ad hoc networks
Distributed processing of probabilistic top k queries in wireless sensor netw...
Participatory privacy enabling privacy in participatory sensing
Dcim distributed cache invalidation method for maintaining cache consistency ...
On the real time hardware implementation feasibility of joint radio resource ...
Error tolerant resource allocation and payment minimization for cloud system
Automatic semantic content extraction in videos using a fuzzy ontology and ru...
Discovery and verification of neighbor positions in mobile ad hoc networks
Ad

Similar to On quality of monitoring for multi channel wireless infrastructure networks (20)

PDF
A Framework for Wireless LAN Monitoring and Its Applications 
PDF
A framework for wireless lan monitoring and its applications
PDF
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Mobilecom...
PDF
Wireless Networks Performance Monitoring Based on Passive-active Quality of S...
PDF
AN ALTERNATE APPROACH TO RESOURCE ALLOCATION STRATEGY USING NETWORK METRICSIN...
PDF
Energy-efficient data-aggregation for optimizing quality of service using mo...
PDF
Network Monitoring System for University
PDF
D044021420
PDF
Quality of Service in Wireless Sensor Networks using Machine Learning.pdf
PDF
Ijciet 10 01_045
PDF
[White paper] detecting problems in industrial networks though continuous mon...
PDF
A REVIEW ON QUALITY OF MONITORING FOR CELLULAR NETWORKS
PDF
Tracking Human Queues
PDF
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Paralleld...
DOCX
2013 ieee .net project titles
DOCX
2013 ieee .net project titles
DOCX
2013 ieee .net project titles
PDF
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
DOC
Java and .net IEEE 2012
A Framework for Wireless LAN Monitoring and Its Applications 
A framework for wireless lan monitoring and its applications
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Mobilecom...
Wireless Networks Performance Monitoring Based on Passive-active Quality of S...
AN ALTERNATE APPROACH TO RESOURCE ALLOCATION STRATEGY USING NETWORK METRICSIN...
Energy-efficient data-aggregation for optimizing quality of service using mo...
Network Monitoring System for University
D044021420
Quality of Service in Wireless Sensor Networks using Machine Learning.pdf
Ijciet 10 01_045
[White paper] detecting problems in industrial networks though continuous mon...
A REVIEW ON QUALITY OF MONITORING FOR CELLULAR NETWORKS
Tracking Human Queues
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Paralleld...
2013 ieee .net project titles
2013 ieee .net project titles
2013 ieee .net project titles
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
Java and .net IEEE 2012

More from IEEEFINALYEARPROJECTS (20)

DOCX
Scalable face image retrieval using attribute enhanced sparse codewords
DOCX
Scalable face image retrieval using attribute enhanced sparse codewords
DOCX
Reversible watermarking based on invariant image classification and dynamic h...
DOCX
Reversible data hiding with optimal value transfer
DOCX
Query adaptive image search with hash codes
DOCX
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
DOCX
Local directional number pattern for face analysis face and expression recogn...
DOCX
An access point based fec mechanism for video transmission over wireless la ns
DOCX
Towards differential query services in cost efficient clouds
DOCX
Spoc a secure and privacy preserving opportunistic computing framework for mo...
DOCX
Secure and efficient data transmission for cluster based wireless sensor netw...
DOCX
Privacy preserving back propagation neural network learning over arbitrarily ...
DOCX
Non cooperative location privacy
DOCX
Harnessing the cloud for securely outsourcing large
DOCX
Geo community-based broadcasting for data dissemination in mobile social netw...
DOCX
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
DOCX
Dynamic resource allocation using virtual machines for cloud computing enviro...
DOCX
A secure protocol for spontaneous wireless ad hoc networks creation
DOCX
Utility privacy tradeoff in databases an information-theoretic approach
DOCX
Two tales of privacy in online social networks
Scalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewords
Reversible watermarking based on invariant image classification and dynamic h...
Reversible data hiding with optimal value transfer
Query adaptive image search with hash codes
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
Local directional number pattern for face analysis face and expression recogn...
An access point based fec mechanism for video transmission over wireless la ns
Towards differential query services in cost efficient clouds
Spoc a secure and privacy preserving opportunistic computing framework for mo...
Secure and efficient data transmission for cluster based wireless sensor netw...
Privacy preserving back propagation neural network learning over arbitrarily ...
Non cooperative location privacy
Harnessing the cloud for securely outsourcing large
Geo community-based broadcasting for data dissemination in mobile social netw...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Dynamic resource allocation using virtual machines for cloud computing enviro...
A secure protocol for spontaneous wireless ad hoc networks creation
Utility privacy tradeoff in databases an information-theoretic approach
Two tales of privacy in online social networks

Recently uploaded (20)

PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
MYSQL Presentation for SQL database connectivity
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPT
Teaching material agriculture food technology
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Encapsulation theory and applications.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Machine learning based COVID-19 study performance prediction
PDF
Empathic Computing: Creating Shared Understanding
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
MYSQL Presentation for SQL database connectivity
“AI and Expert System Decision Support & Business Intelligence Systems”
Dropbox Q2 2025 Financial Results & Investor Presentation
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Unlocking AI with Model Context Protocol (MCP)
The Rise and Fall of 3GPP – Time for a Sabbatical?
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Teaching material agriculture food technology
Spectral efficient network and resource selection model in 5G networks
Encapsulation theory and applications.pdf
Programs and apps: productivity, graphics, security and other tools
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Assigned Numbers - 2025 - Bluetooth® Document
Digital-Transformation-Roadmap-for-Companies.pptx
Network Security Unit 5.pdf for BCA BBA.
Machine learning based COVID-19 study performance prediction
Empathic Computing: Creating Shared Understanding
A comparative analysis of optical character recognition models for extracting...
Accuracy of neural networks in brain wave diagnosis of schizophrenia

On quality of monitoring for multi channel wireless infrastructure networks

  • 1. On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks ABSTRACT: Passive monitoring utilizing distributed wireless sniffers is an effective technique to monitor activities in wireless infrastructure networks for fault diagnosis, resource management and critical path analysis. In this paper, we introduce a quality of monitoring (QoM) metric defined by the expected number of active users monitored, and investigate the problem of maximizing QoM by judiciously assigning sniffers to channels based on the knowledge of user activities in a multi-channel wireless network. Two types of capture models are considered. The user-centric model assumes frame-level capturing capability of sniffers such that the activities of different users can be distinguished while the sniffer-centric model only utilizes the binary channel information (active or not) at a sniffer. For the user-centric model, we show that the implied optimization problem is NP-hard, but a constant approximation ratio can be attained via polynomial complexity algorithms. For the sniffer-centric model, we devise stochastic inference schemes to transform the problem into the user-centric domain, where we are able to apply our polynomial approximation algorithms. The effectiveness of our proposed schemes and algorithms is further evaluated using both synthetic data as well as real-world traces from an operational WLAN. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
  • 2. EXISTING SYSTEM: There has been much work done on wireless monitoring from a system-level approach, in an attempt to design complete systems, and address the interactions among the components of such systems. The work uses AP, SNMP logs, and wired side traces to analyze WiFi traffic characteristics. DISADVANTAGES OF EXISTING SYSTEM:  Ideally, a network administrator would want to perform network monitoring on all channels simultaneously. However, multi-radio sniffers are known to be large and expensive to deploy.  The basic problem underlying all of our models can be cast as finding an assignment of sniffers to channels so as to maximize the QoM.  The problem of sniffer assignment, in an attempt to maximize the QoM metric, is further complicated by the dynamics of real-life systems such as: 1) the user population changes over time (churn), 2) activities of a single user is dynamic, and 3) connectivity between users and sniffers may vary due to changes in channel conditions or mobility. PROPOSED SYSTEM: In this paper, we focus on designing algorithms that aim at maximizing the QoM metric with different granularities of a priori knowledge. The usage patterns are assumed to be stationary during the decision period. We make the following contributions toward the design of passive monitoring systems for multi-channel wireless infrastructure networks. We provide a formal model for evaluating the quality of monitoring. We study two categories of monitoring models that differ in the information capturing capability of passive monitoring systems. For each of these models we provide algorithms and methods that optimize the quality of monitoring. We unravel interactions between the two monitoring models by devising two methods to convert the sniffer-centric model to the user-centric domain by exploiting the stochastic properties of underlying user processes
  • 3. ADVANTAGES OF PROPOSED SYSTEM: The first approach, Quantized Linear ICA (QLICA), estimates the hidden structure by applying a quantization process on the outcome of the traditional ICA, while the second approach, Binary ICA (BICA), decomposes the observation data into OR mixtures of hidden components and recovers the underlying structure. Finally, an extensive evaluation study is carried out using both synthetic data as well as real-world traces from an operational WLAN. HARDWARE & SOFTWARE REQUIREMENTS: HARDWARE REQUIREMENTS: System : Pentium IV 2.4 GHz. Hard Disk : 40 GB. Floppy Drive : 1.44 Mb. Monitor : 15 VGA Color. Mouse : Logitech. Ram : 512 MB. SOFTWARE REQUIREMENTS: Operating system : Windows XP Professional. Coding Language : C#.NET REFERENCE: Huy Nguyen, Gabriel Scalosub and Rong Zheng,Senior Member, IEEE “On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks”- IEEE TRANSACTIONS ON MOBILE COMPUTING, 2013.