4 research outputs found

    Despliegue de una infraestructura para el análisis del tráfico 802.11

    Get PDF
    Durante los últimos años nos hemos convertido en una sociedad cada vez más móvil. Debido a esto, las formas tradicionales de comunicación se están quedando obsoletas. Los usuarios demandan una comunicación y conexión a la red libre, sin necesidad de estar conectados físicamente con un cable a la red. Estas necesidades son cubiertas por las redes inalámbricas, y en particular las redes WiFi. Existen estudios que demuestran un aumento de este tipo de redes en los últimos años, y uno aun mayor en años próximos. Algunas de las ventajas de estas redes, aparte de libre movilidad y circulación de usuarios mencionada ya anteriormente, son su bajo coste - en cuanto a la instalación de la infraestructura y su despliegue- , su versatilidad a la hora de dar servicio a múltiples dispositivos (smartphones, PDAs, ebooks, tablets, etc.), su presencia en muchos lugares públicos (como aeropuertos, centros comerciales, estaciones, oficinas, etc.), su fácil complementación con otro tipo de redes, etc. Pero si bien es necesario gestionar y administrar las redes cableadas, es todavía más importante hacerlo con las redes inalámbricas. El principal motivo es que la información, al carecer de cables que conectan los dispositivos entre sí, circula libremente por el medio aéreo, por lo que está al alcance de cualquier usuario con capacidades para capturar dicho tráfico. Gracias a la gestión y monitorización de la red se pueden detectar ataque de intrusos, identificar usuarios, detectar zonas de baja cobertura, mostrar información del uso de la red, prevenir posibles fallos por caída de equipos, etc. Por esto es necesario llevar una monitorización de la red, para hacer una gestión y administración lo más optima posible para el sistema. Basándose en estas necesidades se ha realizado este Trabajo Fin de Grado, en el que se ha diseñado e implementado un sistema para el análisis del tráfico 802.11. El sistema consiste en el despliegue de una serie de nodos inalámbricos por el Departamento de Ingeniería Telemática de la Universidad Carlos III de Madrid, que están encargados de monitorizar el tráfico que se produce en las zonas por las que están desplegados, para posteriormente poder analizar y gestionar de manera eficiente la red. El proyecto de implementación de este sistema en el Departamento se puede dividir en las siguientes etapas. La primera de ellas consiste en, por un lado, configurar los nodos inalámbricos para automatizar las tareas de monitorización y, por otra parte, un servidor que los controle y en el que almacenar la información recogida. Este proceso se realiza mediante un registro de los nodos en el servidor, un envío de órdenes por parte del servidor especificas para cada nodo, y un almacenamiento de los datos recogidos por los nodos en el servidor. En la segunda etapa se despliegan los nodos por el Departamento, de manera que se intenta cubrir el mayor área posible para tener información representativa del tráfico de la red. Durante un mes y medio aproximadamente se va a monitorizar el trafico de la red y almacenar dicha información en el servidor. Finalmente con todos los datos recogidos, y con el fin de comprobar el correcto funcionamiento del sistema y mostrar alguna de las aplicaciones prácticas que se pueden llevar a cabo gracias a este sistema, se realiza un breve análisis de los datos para obtener cierta información relevante de la red. Estos datos se analizan de tres manera, una primera en la que se implementará una aplicación web para visualizar los datos en tiempo real; mediante mapas de gradientes que muestren tráfico de la red; y con graficas que muestran la carga de las zonas controladas por los nodos.In recent years the world has evolved into an increasing mobile society. Because of this, traditional ways of communication are becoming obsolete. Users demand a certain freedom in their communication and in his communication networks, without the requirement of being physically connected with cable to the network. The wireless networks meet these needs, particularly WiFi networks. Some studies show an increase in this type of networks during last the years, and larger success in future years. Some of the advantage of these networks, besides free mobility and circulation of users already mentioned above, are the low cost in terms of infrastructure and deployment, its versatility to provide service to multiple devices (smartphones, PDAs, ebooks, tablets, etc..), its presence in many public places (airports, malls, stakes, offices, etc..), even as a complement to wired networks, etc.. Its really necessary to manage and administer wired networks but is even more important to do with wireless ones. The main reason for this need is that information, due to the lack of wires to provide connectivity, flows through the air, so it is available to any user with capabilities to capture that traffic. Thanks to the management and monitoring of these networks, we can detect attacks to the network, identify users, identify areas of low coverage, show information about network usage, prevent possible failures, etc. For all the stated above this thesis claims that network monitoring is necessary in order to provide the optimal management and administration possible of the network. This thesis has been elaborated motivated by the above needs to designed and implemented a system to analysis traffic 802.11. The system consists of the deployment of a certain number of wireless nodes in the Department of Telematics of the University Carlos III of Madrid. These nodes have the responsibility of monitoring the traffic that flows in these areas where they are deployed, for a posteriori analysis and could manage the network efficiently. The system can be divided into the following stages. The first is to configure the wireless nodes to automate the tasks of monitoring, and a server to store the information of the network. This process is executed by a register of the nodes in the server, then the server transfer specific orders to each of node, finally the nodes store that collected data on the server. In the second stage, the nodes are deployed by that Department, intended to cover all areas. The monitoring system has been active for a month and a half is going to monitoring the network capturing traffic and storing this information on the server. Finally, with all the data collected, and in order to check the correct operation of the system and show some of the applications that can be carried out thanks to him, an analysis is performed to get some information. These data are analyzed in three ways, the first with application web (is implemented to display the data in real time), using gradient maps of the network traffic, and with graphics that show the load of the network.Ingeniería Telemátic

    An evaluation of the broadband ecosystem in Western Downs region (WDR)

    Get PDF
    There is a large body of research on broadband adoption and use at the macro and national level, however, there is limited research on rural and remote areas. This research provides an in-depth understanding of the broadband ecosystem in terms of supply (broadband infrastructure), and household demand (adoption and use) of broadband Internet and its impact (building and maintaining social capital) in the Western Downs Region (WDR) of Queensland, Australia. Using the broadband ecosystem as an overarching framework, three phases and a mixed methods approach was used to conduct an in-depth explanatory case study of the WDR. The first research phase collected publicly available archival (primarily quantitative) data and field data from testing of mobile networks to determine and evaluate the status (supply) of broadband infrastructure in the WDR (RQ1). The second research phase collected primarily qualitative information using semi-structured interviews to address research questions (RQ2 and RQ3). The third phase, using a survey, collected quantitative data to validate and test broadband adoption, use and impact components of the broadband ecosystem (RQ2 and RQ3, 13 hypotheses). Thereby, the second and third research phase determined the extent of adoption and use of broadband Internet services by households and its impact in helping to build and maintain social capital in rural communities in the WDR. The research findings show that there are limitations in broadband infrastructure in remote and outer regional locations. In these locations, most households rely on mobile broadband services which were clearly demonstrated to be patchy at best in most areas of the WDR. To a lesser extent in remote and outer regional locations affordability of mobile broadband is also an issue for households given the lower socio-economic status of much of rural Australia including the WDR. Furthermore, data quotas are much more expensive for mobile broadband and satellite broadband in comparison to wired broadband. Hence, there would also appear to be a digital divide, particularly between remote and outer regional locations of the WDR and inner regional and urban locations in Australia. The researcher also demonstrated that this reflects a similar situation in many other remote and outer regional locations in Australia. The findings indicate that most households have moved beyond the adoption phase to the use phase and indicate that hedonic outcomes, self-efficacy and number of years of Internet use are significant determinants of actual use of broadband. Conversely, perceived cost, prior knowledge and experience factors were found to be significant determinants of intention to adopt and use broadband services. However, utilitarian outcomes and purchase complexity had no significant impact on intention to adopt and use. The study also found that broadband Internet use has significant impact for rural communities in the WDR by helping to build and maintain social capital (bonding and bridging). This research has made several important contributions to knowledge, theory and practice. Firstly, this research adapted the Broadband Ecosystem framework to incorporate system quality and impact components of information systems success theory, Technology Acceptance Model (TAM) and Model of Adoption of Technology in Household (MATH) technology adoption theories and two dimensions of social capital theory (bridging and bonding theory) which complement the overarching economic theory of supply and demand in this theoretical and conceptual model. Secondly, this research addressed an important gap in information systems research -the lack of empirical research on digital infrastructure. In this study, broadband infrastructure was included in a comprehensive evaluation of the broadband ecosystem in a rural setting, the WDR. Thirdly, by focusing on two units of analysis broadband infrastructure in a rural region and household adoption, and use and impact of broadband this study addresses important research problems from a societal and government policy perspectives. Fourthly, this research examined and validated the broadband ecosystem framework using mixed methods approach in a rural context. Finally, this research has made significant practical contributions which can inform government policy by identifying that availability, reliability and affordability shortcomings of broadband infrastructure in outer regional and remote regions is impacting household adoption, use and benefits of broadband services in rural Australia. Hence, future government policy needs to ensure that access to reliable and high speed broadband services is part of its Universal Service Obligation so that the current shortcomings in broadband infrastructure in rural Australia are prioritised and addressed. This study confirms that improved access and more effective use of broadband could help to address the digital divide that currently exists between rural and urban Australia and also help to build and maintain social capital in rural communities

    Fiscalização da neutralidade da rede e seu impacto na evolução da internet

    Get PDF
    Orientador : Prof. Dr. Elias P. Duarte Jr.Coorientadora : Profa. Dra. Leticia Mara PeresTese (doutorado) - Universidade Federal do Paraná, Setor de Ciências Exatas, Programa de Pós-Graduação em Informática. Defesa: Curitiba, 15/12/2017Inclui referências : f. 174-202Área de concentração : Ciência da computaçãoResumo: Desde 2002 temos presenciado um longo e controverso debate mundial sobre a Neutralidade da Rede, tema que envolve aspectos políticos, legais, econômicos, sociais, éticos, técnicos e de competitividade e inovação. A diversidade de aspectos considerados em torno deste tema leva a pontos de convergência e de divergência de opiniões, de acordo com os interesses dos agentes envolvidos. A Neutralidade da Rede refere-se à Internet aberta, na qual os usuários podem transitar de acordo com a sua liberdade de escolha. Em linhas gerais, a Neutralidade da Rede significa que os provedores de Internet, denominados ISPs (Internet Service Providers) não podem bloquear, estrangular, ou priorizar o conteúdo que trafega em suas redes. E, ainda, a Neutralidade da Rede significa que o ISP só pode cobrar do usuário final uma única vez pelo acesso à sua rede, e não pode cobrar dos provedores de conteúdo pelo conteúdo que trafega na sua rede. Nesta mesma senda, encontra-se o problema da violação ou da quebra da Neutralidade da Rede. Em traços largos, pode-se afirmar que ao longo deste tempo em que perdura o debate, os ISPs têm apresentado as mais diversas formas de violar a Neutralidade da Rede. Estas violações são detectadas e relatadas por usuários finais, ou por organizações, ou por membros da comunidade técnico-científica. Esta comunidade tem criado e utilizado mecanismos computacionais para monitorar o tráfego da Internet. Estes mecanismos computacionais têm por finalidade detectar alguma violação ou inconformidade com os preceitos da Neutralidade da Rede. Dentre as violações efetuadas pelos ISPs encontram-se os bloqueios de acesso a conteúdos, aplicações e portas; o estrangulamento e a diferenciação de tráfego; a velocidade ofertada abaixo da velocidade mínima contratada; a degradação do desempenho da rede; a oferta do serviço chamado de taxa zero, que discrimina e prioriza o tráfego; além de outras. Os ISPs, notadamente opositores à Neutralidade da Rede, continuam exercendo pressão junto às agências reguladoras e junto a políticos, a fim de impedir, retardar ou, até mesmo, modificar normatizações já instituídas. Isto comprova a permanência do debate, sem qualquer demonstração de previsão temporal em curto prazo para solucioná-lo. Como resultado de pesquisa, esta tese contribui para os avanços na área com a descrição de esforços mundiais de normatização bem como com o relato de diversos estudos de caso de violações nos cinco continentes. Esta tese também descreve ferramentas e estratégias desenvolvidas para detectar algum tipo de violação à Neutralidade da Rede. Além disso, é apresentado um estudo preliminar sobre uma possível correlação entre a regulação da Neutralidade da Rede e a evolução da infraestrutura da Internet no mundo. E, ainda, com o objetivo de contribuir de forma específica com o avanço deste tema no Brasil, apresenta um panorama dos agentes envolvidos neste contexto e o papel de cada um. E, finalmente, foi criado o Observatório da Neutralidade da Rede como uma ferramenta de controle social, para todos os aspectos inerentes à Neutralidade da Rede, a ser utilizada pela sociedade brasileira. Palavras-chave: Detecção de Violação à Neutralidade da Rede; Regulação da Neutralidade da Rede; Observatório de Neutralidade da Rede; Ferramentas computacionais para a Neutralidade da Rede.Abstract: Since 2002 we have witnessed a long and controversial debate around Net Neutrality, a subject that encompasses multiple aspects, not only technical but also political, legal, economic, social, ethical, and also those related to competitiveness and innovation. The diversity of aspects around this subject raises opinions that both converge and diverge, according to the interests of the parts involved. Net Neutrality refers to an Open Internet that does not restrict users, enforcing their free choice. According to Net Neutrality principles, Internet Service Providers (ISP) cannot block, throttle or create fast tracks for any kind of pick traffic on their network. Furthermore, Net Neutrality means that an ISP is only allowed to charge end users once for the access to its network, and cannot charge content providers for making their content available. The Net Neutrality debate involves not only what is required/wanted but also the issue of Net Neutrality violations. It is possible to say that since the debate has started, ISPs have been shown to violate multiple Net Neutrality principles. Violations have been detected and reported by end users, or by organizations or by the technical community. This community has also devised strategies to monitor Internet traffic with the purpose of detecting violations or any type of non-compliance with the basic Net Neutrality principles. The ISP violations that have been reported include: blocking access to specific content, applications or ports; throttling and traffic discrimination; offering a network speed that is lower than the minimum speed agreed with the user; delivering low network performance; offering zero-rate services which discriminate and prioritize the traffic; among many others. ISPs, notably Net Neutrality opponents, continue to exert pressure on regulators and politicians to prevent, delay or even modify existing regulations. This proves that the debate has continued, without any hint that it will be solved in the short term. One of the contributions of this thesis is a comprehensive description of global regulatory efforts including several case studies of Net Neutrality violations that have occurred across the five continents. This thesis also presents a comprehensive survey of tools and strategies developed to detect Net Neutrality violations. In addition, a preliminary study is presented on a possible correlation between the establishment of Net Neutrality regulations and the evolution of the Internet infrastructure worldwide. Another contribution that has the specific purpose of contributing to the advancement of this theme in Brazil is the description of the agents involved in enforcing Net Neutrality in the country. Finally, the Network Neutrality Observatory was created as a tool that can enable social control of all the aspects inherent to Network Neutrality in Brazil. Keywords: Detection of Net Neutrality violations; Net Neutrality Regulations; Net Neutrality Observatory; Net Neutrality Tools
    corecore