Device App Connection Log
Endpoints Summary
POST
/device_app_connection_log/
Swagger ↗
The Device App Connection Log API enables applications to register
detailedand track network connectionlogsdetails from devices. This endpoint is essential for monitoring network usage patterns, connection quality metrics, andanalyticsgeographicpurposes.locationThisdataendpointacrosscaptures comprehensivedifferent networkconnectivity datatypes includingconnectionWiFi,types,Mobile,security protocols, location information,Bluetooth, andperformanceEthernetmetrics, making it essential for network monitoring applications and connectivity analysis tools.connections.
Base URL: https://gate.zequenze.com/api/v1
Authentication: All endpoints require a Bearer token:
Authorization: Bearer <your-api-token>
Overview
The Device App Connection Log API provides a centralized way to trackcollect and logstore detailed network connectionsconnection information from devices andacross applications.your organization. This API is designedparticularly forvaluable organizationsfor:
Key Features:
The connection logs capture comprehensive network details including network identification (BSSID, Cell ID, MCC/MNC), performance metrics including(RSSI, SINR, link speed), data transferusage (inbound/outbound bytes), and linklocation speeds
Common Use Cases:
Endpoints
POST /device_app_connection_log/
Description: Registers a newcomprehensive network connection log entry with detailed network information,characteristics, performance metrics, and location data. This endpoint isaccepts typicallyconnection calleddata whenfrom a device establishes, maintains, or terminates avarious network connectiontypes toand createstores ait comprehensivefor auditanalytics trail.and monitoring purposes.
Use Cases:
LoggingMobileWiFiapplicationsconnection events with security and performance details
Full URL Example:
https://gate.zequenze.com/api/v1/device_app_connection_log/
Parameters:
| Parameter | Type | In | Required | Description |
|---|---|---|---|---|
| data | string | body | Yes | JSON string containing the network connection log data |
Request Body Schema:
| Field | Type | Required | Description |
|---|---|---|---|
| network_name | string | No | Name of the current network (e.g., "Office WiFi", "Guest Network") |
| network_type | string | Yes | Network |
| network_security | string | Yes | Security |
| network_mccmnc | string | No | Mobile |
| frequency | number | No | Wireless network frequency in |
| authentication | string | No | Authentication |
| bssid | string | No | |
| cellid | string | No | Mobile network Cell ID |
| roaming | boolean | No | |
| latitude | string | No | |
| longitude | string | No | |
| inbytes | integer | No | |
| outbytes | integer | No | |
| link_speed | number | No | |
| quality_metric | string | No | |
| quality_value | number | No |
cURL Example:
curl -X POST "https://gate.zequenze.com/api/v1/device_app_connection_log/" \
-H "Authorization: Bearer YOUR_API_TOKEN" \
-H "Content-Type: application/json" \
-d '{
"network_name": "Office WiFi 5GHz"Main",
"network_type": "wi",
"network_security": "wp2",
"frequency": 5.2,0,
"authentication": "psk"eap",
"bssid": "aa:bb:cc:dd:ee:ff"00:1a:2b:3c:4d:5e",
"roaming": false,
"latitude": "40.7128",
"longitude": "-74.0060",
"inbytes": 1048576,
"outbytes": 524288,
"link_speed": 150.0,
"quality_metric": "rssi",
"quality_value": -45
}'
Example Response:
{
"network_name": "Office WiFi Main",
"network_type": "wi",
"network_security": "wp2",
"network_mccmnc": null,
"frequency": 5.0,
"authentication": "eap",
"bssid": "00:1a:2b:3c:4d:5e",
"cellid": null,
"roaming": false,
"latitude": "40.7128",
"longitude": "-74.0060",
"inbytes": 1048576,
"outbytes": 524288,
"link_speed": 150.0,
"quality_metric": "rssi",
"quality_value": -45.0
}'
Example Response (201 Created):
{
"network_name": "Office WiFi 5GHz",
"network_type": "wi",
"network_security": "wp2",
"network_mccmnc": null,
"frequency": 5.2,
"authentication": "psk",
"bssid": "aa:bb:cc:dd:ee:ff",
"cellid": null,
"roaming": null,
"latitude": "40.7128",
"longitude": "-74.0060",
"inbytes": 1048576,
"outbytes": 524288,
"link_speed": 150.0,
"quality_metric": "rssi",
"quality_value": -45.0
}
Mobile Network Example:
curl -X POST "https://gate.zequenze.com/api/v1/device_app_connection_log/" \
-H "Authorization: Bearer YOUR_API_TOKEN" \
-H "Content-Type: application/json" \
-d '{
"network_name": "Verizon LTE",
"network_type": "mo",
"network_security": "3gp",
"network_mccmnc": "310012",
"authentication": "3gp",
"cellid": "12345678",
"roaming": false,
"latitude": "37.7749",
"longitude": "-122.4194",
"inbytes": 2097152,
"outbytes": 1048576,
"quality_metric": "sinr",
"quality_value": 15.2
}'
Response Codes:
| Status | Description |
|---|---|
| 201 | Created - Connection log successfully registered |
| 400 | Bad Request - Invalid data format or missing required fields |
| 401 | Unauthorized - Invalid or missing authentication token |
| 422 | Unprocessable Entity - |
Common Use Cases
Use Case 1: WiFiMobile ConnectionApp Network Monitoring
ApplicationsMobile monitoringapplications WiFican use this endpoint to track network performance and connectivity patterns. When users experience connectivity issues, the app can log each connection event withdetailed network name,information security type,including signal strength, network type, and location data usage.to This helpshelp identify problematic areas or network performance issues and optimize WiFi deployments.configurations.
Use Case 2: MobileIoT NetworkDevice AnalyticsFleet Management
MobileIoT devicedevices managementdeployed applicationsacross multiple locations can trackregularly cellularreport connectionstheir including carrier information, roamingconnectivity status, helping administrators monitor network coverage, identify devices experiencing poor connectivity, and data consumption to analyze mobileoptimize network infrastructure based on actual usage patterns and costs.performance metrics.
Use Case 3: Location-BasedEnterprise NetworkSecurity AnalysisCompliance
IoTOrganizations can track which networks their devices connect to, monitor security protocols in use, and mobileensure applicationsdevices canonly combineconnect to approved networks. This is particularly valuable for detecting unauthorized network connectionaccess dataor withidentifying GPSdevices coordinatesconnecting to analyzeunsecured network coverage, identify dead zones, and correlate network performance with geographic locations.networks.
Use Case 4: SecurityNetwork AuditingPerformance Analytics
SecurityNetwork applicationsadministrators can logcollect aggregated connection data to analyze network connectionsperformance totrends, detectidentify unusualpeak usage times, monitor data consumption patterns, and make informed decisions about network access patterns, unauthorized network usage, or potential security threats by analyzing connection typescapacity and authenticationinfrastructure methods.improvements.
Use Case 5: PerformanceLocation-Based TroubleshootingServices
NetworkApplications diagnosticproviding toolslocation-based services can capturecorrelate detailednetwork connectionconnectivity metricsdata includingwith linkgeographic speeds,coordinates signalto quality,understand connectivity patterns across different locations, optimize content delivery, and dataprovide transferlocation-aware volumesfeatures tobased help troubleshoot connectivity issues and optimizeon network performance.availability.
Best Practices
-
Data
AccuracyValidation:EnsureAlways validate network type and security valuesuseagainst thespecifiedallowedcodesenumeration(wi,beforemo,sendingbl,requests.etInvalidforvaluestypes;willopn,resultwep,inwpa,validationwp2,errors.3gp for security) to maintain data consistency -
LocationPrivacyPrivacyConsiderations:OnlyWhenincludecollectingGPSlocationcoordinatesdatawhen necessary for your use case and(latitude/longitude), ensure compliance with privacy regulations and obtain appropriate user consent. Consider data anonymization for analytics purposes. -
Batch Processing: For
high-volumeapplicationslogging,generating high volumes of connection logs, consider implementingclient-sidelocalbatchingqueuing and batch processing to reduce APIcallscall frequency and improveperformanceperformance. -
Error Handling: Implement
retryrobustlogicerror handling for networkfailures,connectivitybutissues.avoidStoreduplicatelogsloglocallyentrieswhenbytheusingAPIclient-sideisdeduplicationunreachable and sync when connectivity is restored. -
Data
ValidationCompleteness:ValidateWhile many fields are optional, providing comprehensive datalocallyimprovesbeforethesendingvalue of analytics. Include quality metrics, data usage, and location information when available.
Security: Never log sensitive authentication credentials or personal information. The API is designed to capture network characteristics, not user credentials or private data.
Rate Limiting: Implement appropriate rate limiting in your applications to avoid 400/422overwhelming errors,the API, especially for numericdevices fieldsthat likefrequently change networks or generate high-frequency and quality values