{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:20:15Z","timestamp":1761402015866,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,5]],"date-time":"2019-08-05T00:00:00Z","timestamp":1564963200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,5]]},"DOI":"10.1145\/3300061.3300135","type":"proceedings-article","created":{"date-parts":[[2019,8,5]],"date-time":"2019-08-05T13:20:41Z","timestamp":1565011241000},"page":"1-16","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["ClientMarshal"],"prefix":"10.1145","author":[{"given":"Apurv","family":"Bhartia","sequence":"first","affiliation":[{"name":"Cisco Meraki, San Francisco, CA, USA"}]},{"given":"Bo","family":"Chen","sequence":"additional","affiliation":[{"name":"Cisco Meraki, San Francisco, CA, USA"}]},{"given":"Derrick","family":"Pallas","sequence":"additional","affiliation":[{"name":"Cisco Meraki, San Francisco, CA, USA"}]},{"given":"Waldin","family":"Stone","sequence":"additional","affiliation":[{"name":"Cisco Meraki, San Francisco, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,8,5]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"2004. 802.11i-2004 - IEEE Standard for information technology- Telecommunications and information exchange between systems- Local and metropolitan area networks. https:\/\/standards.ieee.org\/ findstds\/standard\/802.11i-2004.html.  2004. 802.11i-2004 - IEEE Standard for information technology- Telecommunications and information exchange between systems- Local and metropolitan area networks. https:\/\/standards.ieee.org\/ findstds\/standard\/802.11i-2004.html."},{"key":"e_1_3_2_2_2_1","unstructured":"2008. IEEE 802.11k-2008 - IEEE Standard for Information technology-- Local and metropolitan area networks. https:\/\/standards.ieee.org\/ findstds\/standard\/802.11k-2008.html.  2008. IEEE 802.11k-2008 - IEEE Standard for Information technology-- Local and metropolitan area networks. https:\/\/standards.ieee.org\/ findstds\/standard\/802.11k-2008.html."},{"key":"e_1_3_2_2_3_1","unstructured":"2008. IEEE 802.11r-2008 - IEEE Standard for Information technology-- Local and metropolitan area networks. https:\/\/standards.ieee.org\/ findstds\/standard\/802.11r-2008.html.  2008. IEEE 802.11r-2008 - IEEE Standard for Information technology-- Local and metropolitan area networks. https:\/\/standards.ieee.org\/ findstds\/standard\/802.11r-2008.html."},{"key":"e_1_3_2_2_4_1","unstructured":"2011. Cisco Aggressive Load Balancing on Wireless LAN Controllers (WLCs). https:\/\/www.cisco.com\/c\/en\/us\/support\/docs\/wireless\/ 4400-series-wireless-lan-controllers\/107457-load-balancing-wlc. html.  2011. Cisco Aggressive Load Balancing on Wireless LAN Controllers (WLCs). https:\/\/www.cisco.com\/c\/en\/us\/support\/docs\/wireless\/ 4400-series-wireless-lan-controllers\/107457-load-balancing-wlc. html."},{"key":"e_1_3_2_2_5_1","unstructured":"2011. IEEE 802.11v-2011 - IEEE Standard for Information technology-- Local and metropolitan area networks. https:\/\/standards.ieee.org\/ findstds\/standard\/802.11v-2011.html.  2011. IEEE 802.11v-2011 - IEEE Standard for Information technology-- Local and metropolitan area networks. https:\/\/standards.ieee.org\/ findstds\/standard\/802.11v-2011.html."},{"key":"e_1_3_2_2_6_1","unstructured":"2013. Aruba ClientMatch Technology. https:\/\/www.arubanetworks. com\/pdf\/solutions\/TB_ClientMatch.pdf.  2013. Aruba ClientMatch Technology. https:\/\/www.arubanetworks. com\/pdf\/solutions\/TB_ClientMatch.pdf."},{"key":"e_1_3_2_2_7_1","unstructured":"2013. Delivering Reliable Wi-Fi in Large Public Venues. https:\/\/www. winncom.com\/docs\/extricom\/Extricom_WP_Large_Venues.pdf  2013. Delivering Reliable Wi-Fi in Large Public Venues. https:\/\/www. winncom.com\/docs\/extricom\/Extricom_WP_Large_Venues.pdf"},{"key":"e_1_3_2_2_8_1","unstructured":"2015. Device Classification Guide. https:\/\/www.cisco.com\/c\/en\/us\/td\/ docs\/wireless\/controller\/technotes\/8-0\/device_classification_guide. html  2015. Device Classification Guide. https:\/\/www.cisco.com\/c\/en\/us\/td\/ docs\/wireless\/controller\/technotes\/8-0\/device_classification_guide. html"},{"key":"e_1_3_2_2_9_1","unstructured":"2018. 802.11r Roaming Issue. https:\/\/community.meraki.com\/t5\/ Wireless-LAN\/802--11r-Roaming-Issue\/td-p\/10743\/.  2018. 802.11r Roaming Issue. https:\/\/community.meraki.com\/t5\/ Wireless-LAN\/802--11r-Roaming-Issue\/td-p\/10743\/."},{"key":"e_1_3_2_2_10_1","unstructured":"2018. 802.11r Vulnerability. https:\/\/documentation.meraki.com\/ zGeneral_Administration\/Support\/802.11r_Vulnerability_(CVE%3A_ 2017--13082)_FAQ.  2018. 802.11r Vulnerability. https:\/\/documentation.meraki.com\/ zGeneral_Administration\/Support\/802.11r_Vulnerability_(CVE%3A_ 2017--13082)_FAQ."},{"key":"e_1_3_2_2_11_1","unstructured":"2018. Apple: About wireless roaming for enterprise. Retrieved 2018--11-01 from https:\/\/support.apple.com\/en-us\/HT203068  2018. Apple: About wireless roaming for enterprise. Retrieved 2018--11-01 from https:\/\/support.apple.com\/en-us\/HT203068"},{"volume-title":"Cisco Visual Networking Index: Forecast and Methodology","year":"2016","key":"e_1_3_2_2_12_1","unstructured":"2018. Cisco Visual Networking Index: Forecast and Methodology , 2016 --2021. https:\/\/www.cisco.com\/c\/en\/us\/solutions\/ collateral\/service-provider\/visual-networking-index-vni\/ complete-white-paper-c11--481360.html 2018. Cisco Visual Networking Index: Forecast and Methodology, 2016--2021. https:\/\/www.cisco.com\/c\/en\/us\/solutions\/ collateral\/service-provider\/visual-networking-index-vni\/ complete-white-paper-c11--481360.html"},{"key":"e_1_3_2_2_13_1","unstructured":"2018. Iperf2 tool. https:\/\/iperf.fr\/.  2018. Iperf2 tool. https:\/\/iperf.fr\/."},{"key":"e_1_3_2_2_14_1","unstructured":"2018. IxChariot. https:\/\/www.ixiacom.com\/products\/ixchariot.  2018. IxChariot. https:\/\/www.ixiacom.com\/products\/ixchariot."},{"key":"e_1_3_2_2_15_1","unstructured":"2018. Samsung: Enhanced Roaming Algorithm. Retrieved 2018-09--12 from https:\/\/support.samsungknox.com\/hc\/en-us\/articles\/ 115013403768-Enhanced-Roaming-Algorithm  2018. Samsung: Enhanced Roaming Algorithm. Retrieved 2018-09--12 from https:\/\/support.samsungknox.com\/hc\/en-us\/articles\/ 115013403768-Enhanced-Roaming-Algorithm"},{"key":"e_1_3_2_2_16_1","unstructured":"2018. Wi-Fi Alliance\u00aepublishes 2018 Wi-Fi\u00aepredictions. https:\/\/www.wi-fi.org\/news-events\/newsroom\/ wi-fi-alliance-publishes-2018-wi-fi-predictions  2018. Wi-Fi Alliance\u00aepublishes 2018 Wi-Fi\u00aepredictions. https:\/\/www.wi-fi.org\/news-events\/newsroom\/ wi-fi-alliance-publishes-2018-wi-fi-predictions"},{"key":"e_1_3_2_2_17_1","unstructured":"Mike Albano. 2018. Clients capability support. Retrieved 2018--11-01 from https:\/\/clients.mikealbano.com\/  Mike Albano. 2018. Clients capability support. Retrieved 2018--11-01 from https:\/\/clients.mikealbano.com\/"},{"volume-title":"2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS). 1--6.","author":"Bharadwaj K.","key":"e_1_3_2_2_18_1","unstructured":"K. Bharadwaj , S. Kalpalatha , and V. Ramaiyan . 2017. A simulation framework for radio resource management in WiFi networks . In 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS). 1--6. K. Bharadwaj, S. Kalpalatha, and V. Ramaiyan. 2017. A simulation framework for radio resource management in WiFi networks. In 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS). 1--6."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131398"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787489"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2009.2031971"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2010.020110.00047"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7997013"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2007.404"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851203"},{"key":"e_1_3_2_2_26_1","unstructured":"Dash Kaushik Harish Gnanasambandam and Vikas Banerjee. 2017. The Power of Virtual Cell Wi-Fi. https:\/\/www.fortinet.com\/blog\/ industry-trends\/the-power-of-virtual-cell-wi-fi.html  Dash Kaushik Harish Gnanasambandam and Vikas Banerjee. 2017. The Power of Virtual Cell Wi-Fi. https:\/\/www.fortinet.com\/blog\/ industry-trends\/the-power-of-virtual-cell-wi-fi.html"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/354871.354874"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2980159.2980167"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1454503.1454529"},{"volume-title":"hostapd: IEEE 802.11 AP","author":"Malinen Jouni","key":"e_1_3_2_2_30_1","unstructured":"Jouni Malinen . 2018. hostapd: IEEE 802.11 AP , IEEE 802.1X\/WPA\/WPA2\/EAP\/RADIUS Authenticator . https: \/\/w1.fi\/hostapd\/ Jouni Malinen. 2018. hostapd: IEEE 802.11 AP, IEEE 802.1X\/WPA\/WPA2\/EAP\/RADIUS Authenticator. https: \/\/w1.fi\/hostapd\/"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2008.01.025"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/990064.990090"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134680.1134705"},{"key":"e_1_3_2_2_34_1","unstructured":"Angela Orebaugh Gilbert Ramirez Jay Beale and JoshuaWright. 2007. Wireshark & Ethereal Network Protocol Analyzer Toolkit. Syngress Publishing.   Angela Orebaugh Gilbert Ramirez Jay Beale and JoshuaWright. 2007. Wireshark & Ethereal Network Protocol Analyzer Toolkit. Syngress Publishing."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2500423.2500448"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.17485\/ijst\/2016\/v9i26\/93565"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3056102"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2844088"},{"key":"e_1_3_2_2_39_1","volume-title":"Proceedings of the 8th USENIX Conference on Networked Systems Design and Implementation (NSDI'11)","author":"Shrivastava Vivek","year":"2011","unstructured":"Vivek Shrivastava , Shravan Rayanchu , Suman Banerjee , and Konstantina Papagiannaki . 2011 . PIE in the Sky: Online Passive Interference Estimation for Enterprise WLANs . In Proceedings of the 8th USENIX Conference on Networked Systems Design and Implementation (NSDI'11) . USENIX Association, Berkeley, CA, USA, 337--350. http:\/\/dl.acm.org\/citation.cfm?id= 1972457.1972492 Vivek Shrivastava, Shravan Rayanchu, Suman Banerjee, and Konstantina Papagiannaki. 2011. PIE in the Sky: Online Passive Interference Estimation for Enterprise WLANs. In Proceedings of the 8th USENIX Conference on Networked Systems Design and Implementation (NSDI'11). USENIX Association, Berkeley, CA, USA, 337--350. http:\/\/dl.acm.org\/citation.cfm?id=1972457.1972492"},{"key":"e_1_3_2_2_40_1","volume-title":"Gigabit Wireless Networking with IEEE 802.11ac:Technical Overview and Challenges. 10 (04","author":"Siddiqui Farhan","year":"2015","unstructured":"Farhan Siddiqui , Sherali Zeadally , and Khaled Salah . 2015. Gigabit Wireless Networking with IEEE 802.11ac:Technical Overview and Challenges. 10 (04 2015 ). Farhan Siddiqui, Sherali Zeadally, and Khaled Salah. 2015. Gigabit Wireless Networking with IEEE 802.11ac:Technical Overview and Challenges. 10 (04 2015)."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098846"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906393"},{"volume-title":"Proceedings of the 5th ACM SIGCOMM Conference on Internet Measurement (IMC '05)","author":"Vasudevan S.","key":"e_1_3_2_2_43_1","unstructured":"S. Vasudevan , K. Papagiannaki , C. Diot , J. Kurose , and D. Towsley . 2005. Facilitating Access Point Selection in IEEE 802.11 Wireless Networks . In Proceedings of the 5th ACM SIGCOMM Conference on Internet Measurement (IMC '05) . USENIX Association, Berkeley, CA, USA, 26--26. http:\/\/dl.acm.org\/citation.cfm?id=1251086.1251112 S. Vasudevan, K. Papagiannaki, C. Diot, J. Kurose, and D. Towsley. 2005. Facilitating Access Point Selection in IEEE 802.11 Wireless Networks. In Proceedings of the 5th ACM SIGCOMM Conference on Internet Measurement (IMC '05). USENIX Association, Berkeley, CA, USA, 26--26. http:\/\/dl.acm.org\/citation.cfm?id=1251086.1251112"},{"key":"e_1_3_2_2_44_1","volume-title":"Qun Li, Guanhua Yan, and Jie Wu.","author":"Xu Fengyuan","year":"2010","unstructured":"Fengyuan Xu , Chiu Chiang Tan , Qun Li, Guanhua Yan, and Jie Wu. 2010 . Designing a Practical Access Point Association Protocol .. In INFOCOM. IEEE, 1361--1369. http:\/\/dblp.uni-trier.de\/db\/conf\/infocom\/ infocom2010.html#XuTLYW10 Fengyuan Xu, Chiu Chiang Tan, Qun Li, Guanhua Yan, and Jie Wu. 2010. Designing a Practical Access Point Association Protocol.. In INFOCOM. IEEE, 1361--1369. http:\/\/dblp.uni-trier.de\/db\/conf\/infocom\/ infocom2010.html#XuTLYW10"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2643230.2643233"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3084041.3084057"}],"event":{"name":"MobiCom '19: The 25th Annual International Conference on Mobile Computing and Networking","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Los Cabos Mexico","acronym":"MobiCom '19"},"container-title":["The 25th Annual International Conference on Mobile Computing and Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3300061.3300135","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3300061.3300135","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:52Z","timestamp":1750202632000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3300061.3300135"}},"subtitle":["Regaining Control from Wireless Clients for Better Experience"],"short-title":[],"issued":{"date-parts":[[2019,8,5]]},"references-count":46,"alternative-id":["10.1145\/3300061.3300135","10.1145\/3300061"],"URL":"https:\/\/doi.org\/10.1145\/3300061.3300135","relation":{},"subject":[],"published":{"date-parts":[[2019,8,5]]},"assertion":[{"value":"2019-08-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}