
WLAN Visualization Meets GIS Mapping 86
martin dodge writes "The Wireless Ntwork Visualization Project (Univ. of Kansas)
has an interesting alternative to just dot maps of wlan base stations. These guys are mapping out the zone of availability using gis. nice maps using aerial photographs backdrops as well.
If you are interested, check out other ways of mapping 802.11b network infrastructure.
"
Implications (Score:1)
Re:Implications (Score:3, Funny)
The implications are horrendus... toasters biting their users, dogs being shaved, and showers riunning only tiped water.
It's is more horrible than giving Saddam 20-30 nuclear bombs and the corridnates to all key US targets.
A Bit of Prevention's Worth a Gig of Cure (Score:1)
While the benefits to data mapping wireless far outweigh the risks to facilitating users of Snort/Crack (noun, not command) apps, this doesn't mean we should forget about security. The aforementioned "crackers and script kiddiez" impose costs on the system that must be noted. It's far wiser to look down the road than to burn the bridge when we get there.
And don't think commercial ISPs wouldn't love to see Wi-Fi whacked in its infancy. There's interests lining up behind strangling the babe in its crib.
MOD PARENT UP! (Score:2)
I also betcha Cambridge maps as one, big, continuous WLAN. f*ckers.
FYI, GIS==Geographic Information System (Score:3, Informative)
Geographic Information Science as well... (Score:2, Informative)
The other reason is that there actually is (in an ideal world) a bit of expertise required--and familiarity with geography, and no I'm not talking about "What's the capital of so-and-so"--to fully understand what you are doing with the data.
I've found a great deal of folks in the public and non-profit sectors who are far too cavalier with their interpretations of data that they crunched on for a while...they think that because they used expensive software they must be getting some real value out of it.
Anyway, the point is that it's not some black box technological marvel. There is plenty of Science (geographic, statistical, etc etc) behind the Systems.
GRASS GIS is cool but sadly I work at a Winders shop, so it's ArcGIS for me (and plenty of contact with the abhorrent DBF file format).
I love it! (Score:1)
Now, if we can just get them to do the project at a national level and post a searchable map, like Mapquest, on the web it would be awesome. Going on the road? Just grab a map before you go and stay connected the whole time, probably free of charge too! Since, so many of the WLANs aren't secured.
Re:I love it! (Score:3, Interesting)
If you're driving down a highway with continuous 802.11b coverage and all the APs are set up to allow external access using some common agreed upon collection of settings (no WEP, a standard network name, etc), how well would a card support switching from AP to AP within seconds of each other?
Re:I love it! (Score:2)
Speeding as overclocking (Score:3, Funny)
Your 2.4GHz card will overclock to 4.8GHz with twice the bandwidth if you travel at the speed of light down the highway.
Re:I love it! (Score:4, Informative)
One thing you do need to do is change channels. 802.11b specifies 11 channels (in the US), so to be thourough you should check them all. To be efficient, you can only check 1,6,11 because that's what everybody uses. Depending on how many channels you are checking and how fast you scan puts a limit on how fast you can drive and expect to pick everything up.
Of course, if you are just checking out coverage for a specific AP, you can stay on it's channel and wander around the immediate area to get lots of good data points about it's coverage. It all depends on what exactly you are trying to accomplish.
Re:I love it! (Score:2)
Re:I love it! (Score:2)
Re:I love it! (Score:3, Interesting)
The first problem is that the breezecom stuff is FHSS which is a little bit easier to "roam" than DSSS, simply because you can hear neighboring AP's without having to switch channels as you do with DSSS, thus you know more about neighboring AP's.
The next problem is that the network has to be specially designed to support roaming clients. It has to have intelligence on the ethernet side of the AP's to teach the network about roaming client routing, so that packets always get to where they need. In large WLAN's, AP's are all rarely connected via a 100mbps backbone or the like. They are often connected with layer 3 switches, or worse -- routers, such that roaming is near impossible anyway without using special client software that implements MobileIP (or even ipv6)
The final problem with the way that breezecom does it is that their roaming is proprietary. The AP's preauthenticate clients before they show up, saving time after switching. It's not compatible with 802.11, though "regualr" 802.11 FHSS cards can indeed roam on breezecom equipment.
The fast roaming modes do not work on the breezecom direct sequence 802.11b equipment. You must be going 5mph or practically 10mph to roam seamlessly (ie without a data stream interruption) on this equipment.
hand-over and ipv6 (Score:2, Interesting)
It is embedded in cellular networks (PCS, GSM, 3G, etc.) but is not (I think) a 802.11b feature, which was built for home, soho networks, not wireless internet coverage.
Besides, even if you could negotiate a transaction fast enough to keep the overhead low, the lack of a persistent ip address and connection scheme (firewalls) would make it difficult to work.
OTOH, a telecom-carrier operated wireless network is easy to standardize, and made for this type of thing (I remember having an half hour phone call on a 180mph train in France).
The real issue here is cost :
802.11b works because it's cheap and can be built by geeks, but hasn't got the features of a telecom network that's expensive to install, operate, and that nobody is really willing to pay for. (the market just isn't here yet : Metricom, anyone)
Besides, most features were supposed to come with 3G networks, but with fear of bankruptcy in the telecom sector, there is little chance we see this working before two years.
just my 0.02 euros
Re:hand-over and ipv6 (Score:2, Informative)
How the cellular network does this is to have a central computer (the cellular switch, or BSC in a GSM network) monitoring the RF connection to each subscriber's mobile. If tht S/N, BER, or overall recieve level reaches a threshold, the switch starts querying surrounding base stations to get a signal measurement on the mobile. If another base station has a better signal, then a handoff (handover in GSM) is begun.
At the minimum, what would have to happen to make 802.11b do this is central co-ordination.
Re:hand-over and ipv6 (Score:1)
This is the method used by the old analog systems (NMT,AMPS,TACS) not by GSM. In GSM it is the mobile that does all the measurements and sends the result to the BSC. GSM allways tries to make sure you are on the best cell rather than above a certain signal/noise level. If the BSC determines that a better candidate is available it will initiate a handover.
(slightly off-topic aside) Re:I love it! (Score:1)
The engineering dept. at the cell providers have maps that are at least this good, often better.
The maps that the public gets to see, however, don't come from the engineers, but rather the marketing department.
That said, if you had a 3 watt phone with a properly mounted 3Db gain antenna on the roof of your car, you probably could get the coverage that the marketeers claim.
Of course, almost no real customers use a setup like that anymore.
binary vs probability in maps (Score:2)
i worked for a cell phone company a couple of years ago and the tech support was constantly tied up with calls, and the refurbishment warehouse with functioning returns, because people assumed that the coverage maps provided by the company were accurate binary state renditions of coverage (i.e. if you're within the area you can make a call, and if you're outside it you can't). for instance, if you use a road map to drive to the next state, when you cross the line, you're in that state, there's not a 74% probability that you're there (it's 100%). of course cell phone maps are only probability maps related to tower placement, signal strength, and topography, but most people choose from experience not to see it that way, as all their experience has been with road maps.
so you'd get people calling in who tried to make calls downtown/in their basement/behind a hill, or whatever, convinced that their phones were broken cuz they could not get a signal when the map said they could ... often they'd just return a functioning phone and get a replacement mailed to them. it was a horrendous waste of money. ideally the customers need to be told that there's only a probability of making a call from any particular area. but i guess the marketing dept. would put a stop to that.
Re:binary vs probability in maps (Score:1)
Re:binary vs probability in maps (Score:1)
One obvious application (Score:2, Funny)
Wireless Mapping (Score:2, Interesting)
Cool old use for new! (Score:4, Informative)
Re:Cool old use for new! (Score:2)
This project looks like a lot of fun, though.
Maps? I want Road Signs (Score:1)
Why don't they use some of their research funds to lobby the Highway Administration for road signs that would clearly mark places where there was donated bandwidth to be had?
Smoking Crack... (Score:1, Troll)
I don't think I'll be using their Consulting Services [ku.edu] any time soon...
Re:Smoking Crack... (Score:2)
Much like network administration, really - there is no secure box, but if you're more secure than the average, you aren't a tempting target, and will be passed over in favor of the clueless hordes who are ripe for the picking.
A really dedicated person who wants into you specifically? Very little you can do to keep them out, especially if you run wireless.
Re:Smoking Crack... (Score:2)
Put a firewall behind the AP, and use some kind of secure tunnel (such as SSH) to get to a functional part of the network.
Re:Smoking Crack... (Score:2)
Re:Smoking Crack... (Score:2)
They are so far off from the best current practices that it's quite pathetic. Anyone who gives a list of security tips like that is unlikely to get my business as an burgler alarm system vendor.
Re:Smoking Crack... (Score:2, Informative)
> use wep (airsnort)
Using WEP is the same as remembering to lock the doors of your hose. People can still pick the locks, but they have to be determined to get in.
> obscure your ssid (set client ssid to ANY)
This should be combined with the suggestion below to turn of SSID broadcasts.
> change default passwords on APs (duh)
Just because its obvious to you, doesn't mean it isn't worth mentioning. People are stupid and need to be reminded of the obvious.
> disable broadcast ssid, but you can't (haha)
Funny, on all of the Access Points I've dealt with, there was either an option called Disable Broadcast SSID, or Closed Network. Checking these meant that you had to know the SSID in order to attach to the network.
> upgrade firmware (what's that gonna do)
Why should we apply patches to Apache or IIS? What's it gonna do?
> enable MAC filtering (Lucent WaveLAN cards have a tool to set their MAC address)
Yes, but there are 2^48 MAC addresses. Guess which ones are allowed to attach to my network.
> Turn off your access points when you are not using them (how mann people are going to do that)
I agree that this is unlikely to happen. But that doesn't mean that it isn't a legitimate way to keep people from using it.
Wave point placement and antenna selection (attacker can use a 12dBi yagi and point it straight at your house)
This point I don't know enough about. It is probably the least useful of any of the suggestions. Especially since most people tend to use the antennas that come with their Access Points
Re:Smoking Crack... (Score:1)
Not really; it's like closing the door. I'd hardly call script kiddies "really determined," but any of them can run airsnort.
But when I hear someone register, then I can get in. Kinda like plaintext password authentication.
While I agree it's a good idea, it's not going to keep the baddies out of the network. For example, the latest firmware for Lucent WaveLAN automatically generates a somewhat random IV, which prevents some of the IV collision attacks documented in the literature. It doesn't stop the fundamental insecurity of WEP, though, and giving people a false sense of security, rather than using a real solution like firewalling the wireless network and only allowing users in through tunneling (such as VPN or SSH tunneling), may be quite harmful.
Re:Smoking Crack... (Score:1)
I hope that they are able to improve on the security. But remember, that nothing can keep out a determined hacker. You can have the best locks, the best security system, and the meanest guard dogs, but it is still possible for someone to rob your house. They'll just have more incentive to go find an easier target.
Re:Smoking Crack... (Score:1)
If you give heavy weapons to your "determined hacker," I agree. But if you're talking about some moron hiding in the bushes with a laptop and a yagi, then I think I can design a system to keep them out, using commercial off-the-shelf (and possibly free) software.
The physical analogy breaks down, since clearly even the government has problems breaking the encryption easily accessable to civilians, while it has no such trouble breaking into civilian buildings (excluding Waco). If we all had access to tanks, antiaircraft missles, and nukes, I probably could keep you a good distance from my home =)
Re:Smoking Crack... (Score:1)
Point that out, get moderated as Troll and Flamebait. I've gotta start metamoderating.
Not that it matters, since I've got karma to burn, but I'd obviously like my posts to get read...
Not quite the same but still... (Score:4, Informative)
You can see it in action here [interrorem.com]
Its very handy to get a clearer idea of where exactly those pesky APs are when you blat past them in a batmobile with a pringles tin sticking out the roof...
my little project at UCSD (Score:4, Interesting)
http://www.cs.ucsd.edu/~ghamerly/wireless.html [ucsd.edu]
Secuirty related questions. (Score:3, Interesting)
Linksys (and other folks) have a flag that disables the SSID broadcast 'feature' of their basestations.
According to netstumbler.com:
"Linksys' latest firmware update for WAP11 includes closed network support. It disables the SSID beacon broadcast and as a result no longer shows up on either the Boingo or CyberPixie roaming clients, nor on Apsniff or NetStumbler network discovery tools. "
Is this REALLY a security 'adder' or can folks discover the network in other ways?
Our
We're investigating adding our VPN to the mix, but it's a non-trivial network topology change for a group that really doesn't have sensitive data.
Re:Secuirty related questions. (Score:1)
Re:Secuirty related questions. (Score:4, Informative)
Many APs allow the user to turn off the SSID broadcast, however if someone nearby has popped their WLAN card into monitor mode, this will enable them to listen into the raw 802.11 frames that carry all your precious data.
Plus anything else that happens to float by on channel 10 for instance.
sniffer-pro and more importantly airopeek both do this.
Mac list restrictions can be overcome in this manner as well: you can specify a MAC by using Ifconfig under linux
kismet does this nicely as part of its "ip address space" discovery work, along with cisco infrastructure enumeration with CDP.
Your plan *should* be pretty secure against casual "browsers". Unless your company has made some enemies recently or is worth something in "Commercial Intelligence" terms, you should be pretty clean.
Of course, I would put a VPN in *as well*...
Re:Secuirty related questions. (Score:1)
(Can PPC2002 connect to a CicsoVPN concentrator?)
Re:Secuirty related questions. (Score:2)
*really* too much hassle though
Re:Secuirty related questions. (Score:1)
FYI, Windows lets you specify MACs, too...
Grass - Public Domain GIS System (Score:2, Informative)
Also, most GIS work is done using ESRI's GIS and Mapping software [esri.com].
Or Mapserver for online stuff (Score:2)
Xix.
Netstumbler (Score:4, Informative)
Re:Netstumbler (Score:2, Informative)
And no mandatory mention of clusters used for War Driving yet?
Come on SlashDotters, I'm disappointed.....
Working in cellular (Score:2, Interesting)
reinventing the wheel (Score:1)
map limitations (Score:1)
Its not as trivial as it seems because coverage can in fact ooze down the street due to tall buildings lining the block, for example. This can either be directly measured or maybe even modeled if one knows the the types of structures in the map.
Not a new idea (Score:1)
From what I can tell, they're just taking i-cubed's idea and applying it to 802.11...something providers will surely do if they ever want to blanket areas with coverage (as cell providers do this now).
Pretty cool anyway, but I must point out prior established work in this area.
They also have some really cool images of my town from above.