Download presentation
Presentation is loading. Please wait.
Published byMelissa Anderson Modified over 9 years ago
1
Introduction to Mobile Computing -CSE 535 Fall 2007 Sandeep K. S. Gupta School of Computing and Informatics Arizona State University
2
Mobile Computing? Computing enabled by presence of wireless enabled portable devices (PDAs, cell phones etc.) Many other names/overlapping computing paradigms: –Pervasive Computing –Ubiquitous Computing –Wireless Computing –Embedded Computing
3
Course Goal To understand what are the fundamental challenges in MC and what are some of the solutions towards solving these fundamental challenges
4
Course Goals - Indirect To get you a high-paying job To enrich you with new ideas To train you in (mobile) systems oriented thinking To prepare you for research/profession in mobile computing – but more generally – in “adaptive” (next- generation) computer systems
5
Course Pre-req Knowledge of Computer Networks, Operating Systems Willingness to learn!
6
Course/Reference Book(s) + Material 1.Fundamentals of Mobile and Pervasive Computing – F. Adelstein, S. K. S. Gupta, G. G. Richard III, and L. Schwiebert – McGraw Hill. –Book Website – Link at bottom of http://impact.asu.edu Reference Books: –Principles of Wireless Networks – Pahlavan and Krishnamurty –Mobile Computing- Imielinski and Korth –Protocols and Architecture for Wireless Sensor Networks - Karl and Willing –Wireless Sensor Networks – Raghavendra, Znati et al. Reading List – posted on the class web site.
7
Topics – Tentative List Mobile and Pervasive Computing Application, Services and Standards –Mobile Info access and dissemination –Mobility and Location Management –Routing and Middleware –Zigbee, Bluetooth, WiFi Wireless Sensor networking, applications and services –Localization –Energy-aware routing Mobile Security and Privacy –Mobile computing security –Sensor network security
8
Course Mechanics Homeworks+Exams+Quizzes: 30% –Exams – take home –Homeworks – may involve programming –Quizzes – may be un-announced Paper presentation: 40% –Presentation, critiquing, discussion (online Google group), summary Term Project –Group –Self-defined (with help of instructor) –Involves analysis/implementation
9
Class Format Lecture (5-75 min) –As class progresses the lecture time will decrease (on average) One or Two Paper presentation (1/2 hr each) –Starting soon! 5 min. mid-break – if desired Note: slides of presenters should be provided to TA one day in advance.
10
Class Cyberpresence http://impact.asu.edu/~mcn/cse535fa07.html –class assignments –Solutions –Slides –reference material Visit regularly for latest information
11
What can you expect from this course? Lots of in-class/ on-line interaction Interesting and challenging assignments and exam questions Reading technical papers – classical as well as state-of-art Technical Writing – critiquing, summarizing Help/Tutorials by instructor/TA on difficult material And lot more!
12
Contacting Me or TA Instructor –Email: sandeep.gupta@asu.edusandeep.gupta@asu.edu Subject line: CSE535Fa07 –Office: BY 522 –Phone: 5-3806 –Office Hours: T-TH 4:30-6pm –Call me || come to my office hrs || Set up an appointment –http://impact.asu.eduhttp://impact.asu.edu TA Su Kim –Email: su.kim@asu.edu –Office BY517AD –Office Hours: MW 4-5:30pm or by appointment
13
What do I do when I am not teaching? –Introduction to IMPACT – Mobile Computing Lab
14
Goal: Pervasive Health monitoring Evaluation of medical applications Features: Secure, Dependable and Reliable data collection, storage and communication Sponsor: Pervasive Health Monitoring IMPACT: Research Use-inspired research in pervasive computing & wireless sensor networking Goal: Increasing computing capacity for datacenters Energy efficiency Features: Online thermal evaluation Thermal Aware Scheduling Sponsor: Thermal Management for Data Centers Goal: Evaluation of crisis response management Features: Theoretical model Performance evaluation Access control for crisis management Sponsor: Criticality Aware- Systems Goal: Container Monitoring for Homeland Security Dynamic Supply Chain Management Features: Integration of RFID and environmental sensors Energy management Communication security Sponsor: Goal: Protect people’s identity & consumer computing from viral threats Features: PKI based Non-tamperable, non-programmable personal authenticator Hardware and VM based trust management Sponsor: ID Assurance Intelligent Container Goal: Protocols for mobile ad-hoc networks Features: Energy efficiency Increased lifetime Data aggregation Localization Caching Multicasting Sponsor: Mobile Ad-hoc Networks Medical Devices, Mobile Pervasive Embedded Sensor Networks BOOK: Fundamentals of Mobile and Pervasive Computing, Publisher: McGraw-Hill Dec. 2004 http://impact.asu.edu
15
What’s Next? Chapter 1: Mobile Adaptive Computing You will be invited to a class Google Group – please join! –http://groups.google.com/groups/asu_cse535fa07http://groups.google.com/groups/asu_cse535fa07 –email: asu_cse535fa07@googlegroups.com
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.