Third, traffic captures were fed into a packet analysis program for convenient packet summary generation.
Fourth, packet summary outputs were sent through a tracking program that continuously classified hosts using wireless host detection algorithms.