1 Mobile Computing and Wireless Networking CS 851 Seminar 2002 Fall University of Virginia.

Slides:



Advertisements
Similar presentations
Localization for Mobile Sensor Networks ACM MobiCom 2004 Lingxuan HuDavid Evans Department of Computer Science University of Virginia.
Advertisements

Winter 2004 UCSC CMPE252B1 CMPE 257: Wireless and Mobile Networking SET 3f: Medium Access Control Protocols.
SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
Routing protocols in mobile sensor networks -Rajiv Menon.
5/1/20151 Mobile Ad hoc Networks COE 549 Random Access I Tarek Sheltami KFUPM CCSE COE
CSE 6590 Department of Computer Science & Engineering York University 1 Introduction to Wireless Ad-hoc Networking 5/4/2015 2:17 PM.
802.11a/b/g Networks Herbert Rubens Some slides taken from UIUC Wireless Networking Group.
Mobile Routing protocols MANET Lecture: 4. DIALOGUE CONTROL In any communication there are two types of user dialogues. –long session-oriented transactions.
1 6/11/ :41 Chapter 10Wireless LANs1 Rivier College CS575: Advanced LANs Chapter 10: Wireless LANs.
CMPE 80N - Introduction to Networks and the Internet 1 CMPE 80N Winter 2004 Lecture 10 Introduction to Networks and the Internet.
1 TTS: A Two-Tiered Scheduling Algorithm for Effective Energy Conservation in Wireless Sensor Networks Nurcan Tezcan & Wenye Wang Department of Electrical.
CS 672 Paper Presentation Presented By Saif Iqbal “CarNet: A Scalable Ad Hoc Wireless Network System” Robert Morris, John Jannotti, Frans Kaashoek, Jinyang.
Wireless Sensor Network Security Anuj Nagar CS 590.
CS Dept, City Univ.1 Research Issues in Wireless Sensor Networks Prof. Xiaohua Jia Dept. of Computer Science City University of Hong Kong.
1 Energy Efficient Communication in Wireless Sensor Networks Yingyue Xu 8/14/2015.
BLACK HOLE IN MANET SUBMITTED TO:--SUBMITTED BY:-- Dr. SAPNA GAMBHIRINDRAJEET KUMAR CSE DEPTT.MNW/887/2K11.
12/28/2003CNSF Workshop Localized Algorithms and Their Applications in Ad Hoc Wireless Networks Jie Wu Dept. of Computer Science & Engineering Florida.
Ch0:1 Tseng:WirelessNet Chapter 0: Chances of Wireless Communications Yu-Chee Tseng Dept of Computer Science and Information Engr. National Chiao-Tung.
IDRM: Inter-Domain Routing Protocol for Mobile Ad Hoc Networks C.-K. Chau, J. Crowcroft, K.-W. Lee, S. H.Y. Wong.
Introduction to Mobile Computing -CSE 535 Fall 2007 Sandeep K. S. Gupta School of Computing and Informatics Arizona State University.
KAIS T CS712 병렬처리 특강 - 차세대 무선네트워크 응용 및 보안 - Syllabus Network & Security Lab.
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
1 Mobile ad hoc networking with a view of 4G wireless: Imperatives and challenges Myungchul Kim Tel:
Maximizing Lifetime of Ad Hoc Networks/WSNs Using Dynamic Broadcast Scheme Guofeng Deng.
How to start research V. Jayalakshmi. Why do we research? – To solve a problem – To satisfy an itch – To gain more market share/ Develop and improve –
IT 351 Mobile &Wireless Computing Semester 1, Dr. Hala Mokhtar Room th floor.
CSE 534: Advanced Computer Networks
PCI 2005 Volos, Greece Nov 2005 Efficient Active Clustering of Mobile Ad-Hoc Networks Damianos Gavalas, Grammati Pantziou, Charalampos Konstantopoulos,
Off By One Power-Save Protocols Corey Andalora Keith Needels.
A Power Saving MAC Protocol for Wireless Networks Technical Report July 2002 Eun-Sun Jung Texas A&M University, College Station Nitin H. Vaidya University.
Off By One Power-Save Protocols Corey Andalora Keith Needels.
SENSOR NETWORKS BY Umesh Shah Mayuresh Patil G P Reddy GUIDES Prof U.B.Desai Prof S.N.Merchant.
Wireless Networks Fall 2009 Saewoong Bahk. –Room: Office hours: Tue,Thu 4-5PM TA: 남창원
Computer Networking Lecture 6 – MAC. 2 Readings [E.2] V. Bharghavan, A. Demers, S. Shenker, and L. Zhang. MACAW: A Media Access Protocol for.
CSC 450/550 Part 1: Introduction. CSC 450/550 Summary (1)Contact information (2)Course objective and topics (3)Course evaluation (4)* The layering principle.
1 Mobile Computing and Wireless Networking CS 851 Seminar 2002 Fall University of Virginia.
Hierarchical Grid Location Management for Large Wireless Ad hoc Networks Sumesh J. Philip Chunming Qiao Dept. of Computer Science and Engineering State.
1 Mobile Computing and Wireless Networking CS 851 Seminar 2002 Fall University of Virginia.
Mobile Computing and Wireless Networking
Ad Hoc Network.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Feb 5, ECET 581/CPET/ECET 499 Mobile Computing Technologies & Apps Data Dissemination and Management 2 of 3 Lecture 7 Paul I-Hai Lin, Professor Electrical.
1 G-REMiT: An Algorithm for Building Energy Efficient Multicast Trees in Wireless Ad Hoc Networks Bin Wang and Sandeep K. S. Gupta Computer Science and.
1 Merges of Wireless Communications and Computer Networks George Lee.
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
Introduction to Mobile Computing -CSE 535 Fall 2010 Sandeep K. S. Gupta School of Computing, Informatics and Decision Systems Engineering Arizona State.
1 CDA 4527 Computer Communication Networking (not “analysis”) Prof. Cliff Zou School of Electrical Engineering and Computer Science University of Central.
Topics in Internet Research Energy Efficient Routing in Ad-Hoc Wireless Networks Aadil Zia Khan Department of Computer Science Lahore University of Management.
Project Topics ECE 591. Project 1: Localization through Wi-Fi and Wireless Camera WIFI localization: Wireless Camera: Goal: Understand RF based localization.
1 CNT 4704 Analysis of Computer Communication Networks Cliff Zou Department of Electrical Engineering and Computer Science University of Central Florida.
1 A Power Control MAC Protocol for Ad Hoc Networks EUN-SUN JUNG, NITIN H. VAIDYA, Wireless Networks 11, 55–66, Speaker: Han-Tien Chang.
Mobile Ad Hoc Networks Part 1: Overview
Mobile Ad Hoc Networks. What is a MANET (Mobile Ad Hoc Networks)? Formed by wireless hosts which may be mobile No pre-existing infrastructure Routes between.
DELAY TOLERANT NETWORK
Overview of Wireless Networks:
CNT 4704 Computer Communication Networking (not “analysis”)
CNT 4704 Computer Communication Networking (not “analysis”)
Energy Efficiency in HEW
CNT 4704 Computer Communication Networking (not “analysis”)
CHARACTERISTICS.
Wireless and Mobile Ad Hoc Networks
Ad Hoc Networks - Performance
Wireless Ad Hoc Network
CNT 4704 Analysis of Computer Communication Networks
Wireless & Mobile Networking CS 752/852 - Spring 2011
EEL 6935 Wireless Ad Hoc Networks
Protocols.
CSE 4340/5349 Mobile Systems Engineering
CS441 – Mobile & Wireless Computing Wireless Network Challenges
Protocols.
Presentation transcript:

1 Mobile Computing and Wireless Networking CS 851 Seminar 2002 Fall University of Virginia

2 More Information  Office (chengzhi): OLSSON 210  address :  Office hour (chengzhi): Tuesday & Thursday 5:15-6:30 pm

3 First Thing to Do !  Everything is in the Web  Syllabus, materials, presentation schedule, …

4 Seminar Requirements  Students should have excellent background on computer networks  Every student needs to do two presentations (begin at Sep 10) o Students need to sign up their first presentation schedule before Sep.4  Each presentation will cover one or two papers  For each presented paper, every student needs to hand in a simple summary which contains: o What is the problem the paper wants to solve? o What is the background? o What are the contribution of the paper? o What is the new idea in the paper? o What is the weakness in the paper?  Term project o Performed in small group which consists of 3~4 students. o Suggested topics will be provided before Sep. 10 o Students need to find their partner before Sep. 12

5 Selected Topics 1.Wireless Medium Access Control 2.IEEE Mobile Ad Hoc Routing 4.Mobile IP 5.TCP over Wireless Link 6.Energy Efficient and Power Aware Protocols 7.Capacity of Wireless Network 8.Mobile Data Management 9.Address auto configuration 10.Location Discovery/Tracking Multicast in Mobile Ad Hoc Network (option) Security (option)

6 1. Wireless Medium Access Control  “MACA - A New Channel Access Method for Packet Radio”. In Proceedings of the 9th ARRL Computer Networking Conference, London, Ontario, Canada,  ``MACAW: A Media Access Protocol for Wireless LANs.'' V. Bharghavan, A. Demers, S. Shenker, and L. Zhang, ACM Sigcomm '94, London, UK. September  "Dual busy tone multiple access (DBTMA): A multiple access control scheme for ad hoc networks", J. Deng and Z. Haas, in IEEE Trans. on Communications, vol. 50, no. 6, 2002.

7 2. IEEE  "IEEE Wireless Local Area Networks“, B. Crow, I. Widjaja, L. Kim, P. Sakai, IEEE Communications Magazine, Vol. 35, No. 9, Sep 1997, pp Also see Chapter 9 in.IEEE Standard specification, 1999  “Does the IEEE MAC protocol work well in multihop wireless ad hoc networks?”, Xu and T. Saadawi, IEEE Communications Magazine, Vol. 39, No. 6, pp , June  "Real-Time Traffic Over the IEEE Medium Access Control Layer", Joao L. Sobrinho and A. S. Krishnakumar, Bell Labs Technical Journal, Autumn 1996

8 3. Mobile Ad-Hoc Routing  “Dynamic source routing in ad hoc wireless networks”, David B. Johnson, David A. Maltz, in Mobile Computing, editor T. Imielinski and Hank Korth, Kluwer  “The performance of query control scheme for the zone routing protocols”, Z. Haas and M. R. Pearlman, in IEEE Trans. on Networking, vol. 9, no. 4, 2001  “Location-Aided Routing (LAR) Mobile Ad Hoc Networks”, Youngbae Ko and N. H. Vaidya, MOBICOM'98, October 1998,

9 4. Mobile IP  "Mobile Networking through Mobile IP“, C. Perkins, IEEE Internet Computing, Vol. 2, No. 1, 1998 "Mobile IP" C. Perkins, IEEE Communications Magazine, Vol. 35, No. 5, 1997.

10 5. Wireless TCP  “I-TCP: indirect TCP for mobile hosts”, ICDCS 1995  “Improving TCP/IP Performance over Wireless Networks”, Hari Balakrishnan, Srinivasan Seshan, Elan Amir, Randy H. Katz. Proc. 1st ACM Conf. on Mobile Computing and Networking, Berkeley, CA, November  "Analysis of TCP performance over mobile Ad-Hoc networks", G. Holland and N. Vaidya, Mobicom 1999

11 6. Energy Efficient and Power Aware Protocols  “An energy efficient MAC protocol for wireless sensor networks”, W. Ye, J. Heidemann, and D. Estrin, in Proceedings of IEEE INFOCOM'02.  “Power-Aware Routing in Mobile Ad Hoc Networks”, S. Singh, M. Woo and C. Raghavendra, MOBICOM'98.  “Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks”, Benjie Chen, Kyle Jamieson, Hari Balakrishnan, and Robert Morris, MobiCom 2001.

12 7. Capacity of Wireless Networks  “Capacity of ad hoc wireless networks”, J. Li, C. Blake, D. S. J. De Couto, H. I. Lee, and R. Morris,in Mobicom 2001.

13 8. Mobile Data Management  “Scheduling Data Broadcast In Asymmetric Communication Environments”, N. H. Vaidya and S. Hameed, ACM/Baltzer Wireless Networks (WINET),  "A Mobile Transaction Model That Captures Both the Data and Movement Behavior," M. Dunham, A. Helal, and S. Balakrishnan, ACM/Baltzer MONET Journal, Vol 2, 1997, pp  "Data consistency in intermittently connected distributed systems", E. Pitoura and B. Bhargava, IEEE Trans on Knowledge and data engineering, vol. 11, no. 6, 1999

14 9. Address Auto Configuration  “Duplicate Address Detection in Mobile Ad Hoc Networks”, Nitin Vaidya, ACM MobiHoc, June 2002.

Location Tracking  “The Cricket Compass for Context-Aware Mobile Applications”, Priyantha et al., MobiCom 2001  “GPS Free Positioning in Mobile Ad Hoc Networks”, Proceedings of IEEE ICSS2001

16 Introduction [1] “Some computer science issues in Ubiquitous Computing” by M. Weiser 1993 [2] “Challenges of Mobile Computing”, by G. H. Forman & J. Zahorjan 1994 [3] “On some principles of Nomadic Computing and Multi-Access Communications” by L. Kleinrock 2000 [4] “Pervasive Computing: Vision and Challenges” by M. Satyanarayanan 2001

17 What is Mobile Computing?  Creating distributed systems with portable computers and wireless communications to allow mobile users to access resources at anytime from anywhere (refer to “Challenges of Mobile Computing”)

18 Buzzwords Ubiquitous Computing, Mobile Computing, Nomadic Computing, Pervasive Computing  Mobile Computing and Nomadic Computing are about building distributed systems with portable computers and wireless communications  Mobile Computing: focus on out-door mobility with pedestrian or vehicular speed  Nomadic Computing: focus on in-door mobility with pedestrian speed (refer to “Anytime, anywhere computing: Mobile Computing and Technology”)  Ubiquitous Computing ==Pervasive Computing (AI + Mobile Computing)  creating environments saturated with computing and communication capacity yet gracefully integrated with human users (refer to “Pervasive Computing: Vision and Challenges” )

19 Many Applications  Military environments  soldiers, tanks, planes  Civilian environments  taxi cab network  meeting rooms  sports stadiums  boats, small aircraft  search-and-rescue  policing and fire fighting  Killer application  Anywhere and anytime access to the Internet

20 Evolution of Computing Freedom from Collocation (space & time) Flexible Resource Usage Single User OS Time Sharing Networked Computing Mobile Computing

21 Three Challenges  Wireless communication  Mobility  Poor local resources due to portability

22 Wireless Communication  Limited transmission range  Limited bandwidth o IEEE a ~54 mbps o IEEE b ~ 11 mbps o IEEE g ~ 20mbps  Frequent disconnections or network partitions  Uncertainty of performance  Variance of bit error  Variance of latency  Variance of bandwidth  Easier for intruders to insert themselves into networks

23 Mobility  Mobility  Dynamic  Network access point changes  Network performance changes (error rate, latency, cost, connectivity …)  Available resources change  Data consistency changes  Application changes oLoss of bandwidth triggers change from color to B&W  Security changes oEndpoint authentication harder oDevices become more vulnerable

24 Poor local resources due to portability  CPU  Memory  limited battery life time All these challenges are instinct and every mobile computing problem is related to one or more than one these challenges

25 Five Areas for Achieved Results refer to “Pervasive Computing: Vision and Challenges”  Mobile networking  Mobile information management  Adaptive techniques  Power management and energy saving  Location sensitivity Topic 1,2,3,4 Topic 8 Topic 10 Topic 6 Topic 5

26 Summary  Mobile computing  Very active and evolving research field  Plenty of interesting research problems  We will learn a lot in this course  Understand the state of the art  New ideas and new results  New ways of using mobile computing  It will be Very Rewarding Dedicate your time and make contributions