There are 3 traces in this traceset
- last modified
-
2006-11-14
- reason for most recent change
-
TCPDUMP traceset is resanitized.
- short description
-
Packet headers from every wireless packet sniffed in 27 buildings on Dartmouth College campus.
- description
-
The packet headers from every wireless packet sniffed in four (Fall01), five (Spring02), or 18 (Fall03) buildings on campus. The Fall 2001 data was used for [MobiCom 2002 paper]. The Fall 2001 and Spring 2002 data was used for [WiNet 2005 paper]. The 2003/4 data was used for [MobiCom 2004 paper]. This fall03 data also contains a list of device types, as determined using the OS fingerprinting tool p0f. Note that the MAC addresses in this list are only devices that we saw associate with an AP (i.e., that appeared in the syslog or SNMP data). Thus it does not include non-wireless client MAC addresses, such as routers or spoofed MACs that do not appear in syslog. The total compressed datasets are over 200 GB, so they are too large to post as tarballs. The best option is to use an http tool like curl or wget to download the whole Fall01, Spring02, or Fall03 directory from the web site. Or you can arrange to send us a USB or firewire drive (>250GB) and we can ship it back to you with all of our data on it. You can get the README, some of my analysis software, and the output of my own analysis programs listing the amount of traffic seen at each sniffer for each port number for each day, that is available as a small (660 KB) tgz file. NB: this is for the 2001/2 data.
- release date
-
2004-11-09
- date/time of measurement start
-
2001-09-25
- date/time of measurement end
-
2004-02-28
- methodology
-
We used network ''sniffers'' to obtain detailed network-level traces. Due to the volume of traffic on the wireless network, it was impractical to capture all the traffic. Moreover, the structure of our WLAN, with several subnets, meant that there was no convenient central point for capturing wireless traffic. Instead, we installed 18 sniffers in 14 different buildings; in some large buildings, we needed multiple sniffers to monitor all of the building's APs. The buildings were among the most popular wireless locations in 2001, and included libraries, dormitories, academic departments and social areas. In total, our 18 sniffers covered 121 APs. Each sniffer was a Linux box with two Ethernet interfaces. One interface was used for remote access, to maintain the sniffer and to obtain the data for analysis. The other interface was used for collecting (''sniffing'') data. In each of the 18 switchrooms we attached the APs to a switch, and set another port on the switch to ''mirror'' mode, so that all the traffic on that switch would be sent to this port. The sniffer's second interface was attached to this mirrored port. We used tcpdump to capture any wireless traffic that came through these APs and their wired interfaces..
- sanitization
-
To sanitize the MAC address, we randomized the bottom six hex digits. We collected every MAC address from all of our syslog, SNMP, an tcpdump traces, and built a huge table mapping real MACs to randomized MACs, ensuring that all mappings are unique. [We did not change either the MAC address 000000000000 or FFFFFFFFFFFF, they remain as they were.] We applied this mapping consistently across all data files of all types, so if you see a MAC address in the tcpdump files, and see it again in the SNMP trace, you can be sure it's the same client. We used a prefix-preserving IP address sanitizer, see Xu, J., Fan, J. Ammar, M., and Moon, S. ``On the Design and Performance of Prefix-Preserving IP Traffic Trace Anonymization'', Proc. of 10th IEEE International Conference on Network Protocols (ICNP 2002), Paris, France, November 2002. What this means is that you can compare the prefixes of the sanitized IP addresses, i.e. if two IP addresses share the same k-bit prefix, the sanitized addresses will also share the same k-bit prefix.
- disruptions to data collection
-
There were unfortunate gaps in the data collection, generally caused by power failures.
- limitation
-
In both Fall01 and Spring02 datasets we lose a little data each day. We restarted tcpdump once a day, to cause it to begin a new log file. We killed the tcpdump process, then started a new one; as a result, some tcpdump data files end with partial packets, and no doubt we lost a few packets in the transition. We missed any traffic between two clients associated with the same AP, as this would not be sent via the AP's wired interface, but we believe this occurred rarely.
- error
-
The Fall01 data in particular suffers from a lot of corruption. It appears that older versions of tcpdump have a serious bug that causes them to record the MAC address of many frames incorrectly. In the Spring we used a newer tcpdump that did not have this problem.
the dartmouth/campus/tcpdump/fall01 trace
- browse the dartmouth/campus/tcpdump/fall01 trace directory
- from a CRAWDAD mirror: US
UK
size="16 GB" type="directory"
- last modified
-
2006-11-14
- reason for most recent change
-
TCPDUMP trace is resanitized.
- short description
-
Packet headers from every wireless packet sniffed on Dartmouth College campus during Fall 2001 term.
- description
-
The packet headers from every wireless packet sniffed in four (Fall01) buildings on campus. The Fall 2001 data was used for [MobiCom 2002 paper] and [WiNet 2005 paper].
- derived
-
false
- release date
-
2004-11-09
- date/time of measurement start
-
2001-09-25
- date/time of measurement end
-
2001-12-10
- format of trace data
-
tcpdump format
- configuration
-
We collected data from four sniffers around the Dartmouth campus. Each sniffer was connected to a hub, along with the building's access points. The four buildings are representative: 1. Sudikoff (AcadBldg16): the Department of Computer Science (6 APs). 2. Brown (ResBldg100): a dormitory with many first-year students (2 APs). 3. Berry (LibBldg2): the main campus library. Due to the size of the building and the switched nature of its network, we were only able to sniff 5 of the 13 APs. 4. Collis/Thayer (SocBldg1): two buildings, the student center and dining hall, containing five cafes, several lounge areas, several meeting rooms, and some offices (total 9 APs).
- disruptions to data collection
-
% Sudi 3 GAPS of about 21h:17m:46s % Brown 15 GAPS of about 213h:10m:33s % Berry 7 GAPS of about 139h:17m:29s % Collis 8 GAPS of about 337h:1m:59s
- limitation
-
We lose a little data each day. To keep file sizes small, and to be able to backup and manipulate the data more easily, we restarted tcpdump once a day, to cause it to begin a new log file. We killed the tcpdump process, then started a new one; as a result, some tcpdump data files end with partial packets, and no doubt we lost a few packets in the transition. [We note that newer versions of tcpdump have a roll-over mechanism built in; too bad it didn't exist for our tracing.] In the fall, we restarted tcpdump at midnight;
- error
-
Data in particular suffers from a lot of corruption. It appears that older versions of tcpdump have a serious bug that causes them to record the MAC address of many frames incorrectly. These bogus MAC addresses, specifically 0:0:0:0:0:0, 0:0:0:0:0:1, 1:0:0:0:0:0, or 1:0:1:0:1:0, occurred in about 78% of all frames in the Fall data. For frames containing IP packets, we examined the source and destination IP address; if the IP address was associated with a valid, wireless MAC address in a recent IP packet, then we assumed this packet used the same MAC, and treated it as a wireless packet. We fixed about a third of bad MACs this way.
the dartmouth/campus/tcpdump/spring02 trace
- browse the dartmouth/campus/tcpdump/spring02 trace directory
- from a CRAWDAD mirror: US
UK
size="22 GB" type="directory"
- last modified
-
2006-11-14
- reason for most recent change
-
TCPDUMP trace is resanitized.
- short description
-
Packet headers from every wireless packet sniffed on Dartmouth College campus.
- description
-
The packet headers from every wireless packet sniffed in five buildings on campus. The Spring 2002 data was used for [WiNet 2005 paper].
- derived
-
false
- release date
-
2004-11-09
- date/time of measurement start
-
2002-03-25
- date/time of measurement end
-
2002-06-09
- format of trace data
-
tcpdump format
- configuration
-
We collected data in the same way, in the same four locations, but added another sniffer on the 8 APs in Whittemore, which is a dormitory at the Tuck School of Business. This data is much cleaner than the fall data.
- disruptions to data collection
-
Berry (LibBldg2): 2 GAPS of about 0h:6m:34s Brown (ResBldg100): 0 GAPS of about 0h:0m:0s Collis (SocBldg1): 5 GAPS of about 27h:24m:22s Sudikoff (AcadBldg16): 0 GAPS of about 0h:0m:0s Whittemore (ResBldg83): 1 GAPS of about 12h:28m:15s
- limitation
-
We lose a little data each day. To keep file sizes small, and to be able to backup and manipulate the data more easily, we restarted tcpdump once a day, to cause it to begin a new log file. We killed the tcpdump process, then started a new one; as a result, some tcpdump data files end with partial packets, and no doubt we lost a few packets in the transition. [We note that newer versions of tcpdump have a roll-over mechanism built in; too bad it didn't exist for our tracing.] We restarted at about 4AM when traffic was lightest.
the dartmouth/campus/tcpdump/fall03 trace
- browse the dartmouth/campus/tcpdump/fall03 trace directory
- from a CRAWDAD mirror: US
UK
size="163 GB" type="directory"
- download the README.voip file
- from a CRAWDAD mirror: US
UK
type="txt"
- last modified
-
2006-11-14
- reason for most recent change
-
TCPDUMP trace is resanitized.
- short description
-
Packet headers from every wireless packet sniffed on Dartmouth College campus during Fall 2003 term.
- description
-
The packet headers from every wireless packet sniffed in 18 buildings on campus. The 2003/4 data was used for [MobiCom 2004 paper]. This fall03 data also contains a list of device types, as determined using the OS fingerprinting tool p0f. a list of device types, as determined using the OS fingerprinting tool p0f (note that the MAC addresses in this list are only devices that we saw associate with an AP (i.e., that appeared in the syslog or SNMP data). Thus it does not include non-wireless client MAC addresses, such as routers or spoofed MACs that do not appear in syslog.). There is also a brief note about the VoIP data included in this trace.
- derived
-
false
- release date
-
2004-11-09
- date/time of measurement start
-
2003-11-02
- date/time of measurement end
-
2004-02-28
- format of trace data
-
tcpdump format
- configuration
-
We increased the number of sniffers again, this time to 18, spread among the same buildings as before, but also with more dorms and social buildings
how to cite this traceset
When writing a paper that uses CRAWDAD tracesets, we would appreciate it if you could cite both the authors of the traceset and CRAWDAD itself, and identify the exact traceset using the appropriate version number. For this traceset, this citation would look like:
David Kotz, Tristan Henderson, Ilya Abyzov, Jihwang Yeo, CRAWDAD dataset dartmouth/campus (v. 2009‑09‑09), traceset: tcpdump, downloaded from https://crawdad.org/dartmouth/campus/20090909/tcpdump, https://doi.org/10.15783/C7F59T, Sep 2009.
We also provide bibliographic information in common citation formats below:
@misc{dartmouth-campus-20090909,
author = {David Kotz and Tristan Henderson and Ilya Abyzov and Jihwang Yeo},
title = {{CRAWDAD} dataset dartmouth/campus (v. 2009-09-09)},
howpublished = {Downloaded from \url{https://crawdad.org/dartmouth/campus/20090909/tcpdump}},
note = {traceset: tcpdump},
doi = {10.15783/C7F59T},
month = sep,
year = 2009
}
Copy to clipboard
Download
TY - DATA
TI - CRAWDAD dataset dartmouth/campus (v. 2009-09-09)
T2 - traceset: tcpdump
UR - https://crawdad.org/dartmouth/campus/20090909/tcpdump
PY - 2009/09/09/
AU - David Kotz
AU - Tristan Henderson
AU - Ilya Abyzov
AU - Jihwang Yeo
DO - 10.15783/C7F59T
ER -
Copy to clipboard
Download
If you do not use the provided citation formats, please include a reference with the same information, as described in the CRAWDAD FAQ.
|