This page is a Firebase-backed viewer for Mermaid diagrams generated by the Android WifiNetAnalyzer app.
The live section signs in with Google, uses the same Firebase web SDK pattern as the Interactrak quiz pages, and lists Mermaid sessions from:
If broad session listing is blocked by RTDB rules, the page also tries the signed-in user’s personal branch and every readable school branch before falling back to the original known demo path.
The UID appears twice because the app is currently storing sessions as:
For a personal scope, {scopeId} is the owner’s UID and {writerUid} is also the same user. School scopes should instead look like /wifi/diagnosticSessions/school/{schoolId}/{writerUid}/{sessionId}.
Live Firebase Mermaid
Static demo
This static block renders even before the live Firebase browsing UI is complete.
graph LR
device["Android device"]
device --> network0["wifi Zeshelan"]
network0 --> gw0_0["Gateway ::"]
network0 --> gw0_1["Gateway 0.0.0.0"]
network0 --> gw0_2["Gateway 192.168.88.1"]
network0 --> dns0_0["DNS 192.168.88.1"]
network0 --> dns0_1["DNS 109.226.0.140"]
network0 --> dns0_2["DNS 109.226.0.141"]
device --> network1["wifi Zeshelan"]
network1 --> gw1_0["Gateway ::"]
network1 --> gw1_1["Gateway 0.0.0.0"]
network1 --> gw1_2["Gateway 192.168.88.1"]
network1 --> dns1_0["DNS 192.168.88.1"]
network1 --> dns1_1["DNS 109.226.0.140"]
network1 --> dns1_2["DNS 109.226.0.141"]
device -->|Wi-Fi ok| probe0["https://www.google.com/generate_204"]
note["Session 2be0ed61-6a1f-43cd-ae74-738de2624aa4 - inferred app-scope topology"]