← Revision 16 as of 2006-09-25 01:55:38
Size: 2452
Comment: location map solutions? (plus added a data item to collect)
|
← Revision 17 as of 2006-09-29 20:28:25 →
Size: 2454
Comment: added place/time
|
Deletions are marked like this. | Additions are marked like this. |
Line 1: | Line 1: |
'''Location:''' All Around the Portland Area[[BR]] '''Date and Time:''' September 30th, Time and Place TBD [[BR]] | '''Location:''' All Around the Portland Area[[BR]] '''Date and Time:''' September 30th, 10:30 am, UrbanGrind [[BR]] |
Location: All Around the Portland AreaBR Date and Time: September 30th, 10:30 am, UrbanGrind BR
Agenda
- Visit, test and collect information at locations identified as once active Personal Telco nodes.
Protocol (tentative)
- Train in Protocol
In teams of 2 or 3, dispatch to each identified location. Identified locations are found here: PersonalTelcoBssids. Each location will have a sheet of paper with a map (I haven't figured out a tractable way to print a nice map on each sheet like I imagined, so unless someone figures something out very soon, I might just end up putting numbered dots on a few city maps).
- One laptop running Kismet or equivalent network stumbler, with GPS if possible.
- Keep an eye on kismet to/from to see if you see more new PTP BSSIDs and check them out as well
CalebPhillips figured out a good way to do this: in kismet, sort by SSID, scroll to the www.personaltelco.net section and look for ! which indicates new packets. beware that some nodes leave off the www part of the SSID.
- Drive around a few neighboring blocks to collect relative signal strength data, which will help in triangulating network location
- At the end of the day, upload stumbling data to wigle (or give to Russell to do so).
- Keep an eye on kismet to/from to see if you see more new PTP BSSIDs and check them out as well
- Another laptop available to connect to the node
- At each location,
- Discover AP presence/absence
For each PersonalTelco-related AP present:
- AP SSID
- AP BSSID
- Note strength of signal at curb
- Connect
- Note presence/absence of splash and any self-identification thereon. If captive portal indicates usage over time (N authentications since date X), note that as well.
- Note local network: DHCP server IP, assigned IP.
Identify the upstream IP using http://www.whatsmyip.org or equivalent
- If possible, identify the lat/long or address of the AP
Volunteers
RussellSenior (also leader of this AmazinglyFunEvent)
- jason at jason justman dot com (GRPS and EV-DO, and serial gps - real time telemetry with google-maps for ajax mashup anyone?)
CalebPhillips (area of interest: desperate and unreasonable desire for organization)
<add-your-name-and-area-of-interest-here>
Results
[http://www.personaltelco.net/~caleb/kismet/2006-09-20/ Data from Trial Run on 2006-09-20]